Search criteria

12 vulnerabilities found for bla-l29c by huawei

VAR-201908-1958

Vulnerability from variot - Updated: 2025-12-22 22:47

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing. Bluetooth BR/EDR The entropy negotiation of the encryption key used for encryption on the connection has a problem that is vulnerable to man-in-the-middle attacks by design. A third party Bluetooth BR/EDR The entropy of the encryption key used for communication 1 Force byte (Key Negotiation Of Bluetooth (KNOB) attack) Brute force attacks on subsequent communications (Brute force attack) May be able to decrypt and intercept the contents. Bluetooth Is Bluetooth Basic Rate / Enhanced Data Rate (Bluetooth BR/EDR) Includes core configuration 6 A short-range wireless technology based on different core specifications and used for low-power short-range communications. Bluetooth To establish encrypted communication for 2 Horn Bluetooth You need to establish a link key that the device will pair and use to generate the encryption key used for encryption at the link layer. The entropy of the encryption key is 1 From bytes 16 In bytes length Bluetooth Set between controllers. When an attacker interrupts the encryption key entropy setting request between controllers and each controller accepts a low entropy setting, encrypted communication with low entropy is forced, resulting in a brute force attack (Brute force attack) Because of this, communication between devices may be easily decrypted.Man-in-the-middle attacks (man-in-the-middle attack) There is a possibility of eavesdropping on encrypted communication by. An encryption issue vulnerability exists in Bluetooth BR/EDR 5.1 and earlier versions. The vulnerability stems from incorrect use of relevant cryptographic algorithms by network systems or products, resulting in improperly encrypted content, weak encryption, and storing sensitive information in plain text. The attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked. This advisory will be updated as additional information becomes available. There are no workarounds that address this vulnerability.

This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth. 8.0) - aarch64, noarch, ppc64le, s390x, x86_64

Bug Fix(es):

  • Backport TCP follow-up for small buffers (BZ#1739184)

  • TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)

  • RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)

  • block: blk-mq improvement (BZ#1780567)

  • RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)

  • blk-mq: overwirte performance drops on real MQ device (BZ#1782183)

  • RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)

  • 8) - x86_64

  • Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)

  • Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)

  • Kernel: page cache side channel attacks (CVE-2019-5489)

  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

  • kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

  • kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)

  • kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)

  • kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)

  • kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)

  • kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)

  • kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)

  • kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)

  • kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)

  • kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)

  • kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)

  • kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)

  • kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)

  • kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)

  • Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)

  • Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):

1656986 - CVE-2018-19854 kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c 1660375 - CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common() 1660385 - CVE-2018-20169 kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS 1663176 - CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT 1663179 - CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1666106 - CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c 1671930 - CVE-2019-7222 Kernel: KVM: leak of uninitialized stack contents to guest 1678887 - RT: update RT source tree to the RHEL-8.1 tree 1686373 - CVE-2019-3874 kernel: SCTP socket buffer memory leak leading to denial of service 1689426 - CVE-2019-3882 kernel: denial of service vector through vfio DMA mappings 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS 1700666 - Make kernel-rt require rt-setup 1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping 1709837 - CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command 1712072 - CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c 1724657 - BUG: scheduling while atomic in zswap 1727756 - CVE-2019-13233 kernel: use-after-free in arch/x86/lib/insn-eval.c 1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) 1728765 - BUG: scheduling while atomic: rcuc/13/134/0x00000002 1729931 - CVE-2019-10638 Kernel: net: weak IP ID generation leads to remote device tracking 1733472 - BUG: scheduling while atomic: rcuc/1/24/0x00000002 1733874 - CVE-2019-10207 kernel: null-pointer dereference in hci_uart_set_flow_control 1743931 - BUG: unable to handle kernel NULL pointer dereference at 0000000000000020 1745646 - [RT] sched/fair: Robustify CFS-bandwidth timer locking 1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer 1750813 - CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service

Bug Fix(es):

  • port show-kabi to python3 (BZ#1806924)

  • 7.6) - ppc64le, x86_64

  • Description:

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

Bug Fix(es):

  • kernel build: parallelize redhat/mod-sign.sh (BZ#1755326)

  • -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra

macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra address the following:

AppleGraphicsControl Available for: macOS Mojave 10.14.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8693: Arash Tohidi of Solita

autofs Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: Extracting a zip file containing a symbolic link to an endpoint in an NFS mount that is attacker controlled may bypass Gatekeeper Description: This was addressed with additional checks by Gatekeeper on files mounted through a network share. CVE-2019-8656: Filippo Cavallarin

Bluetooth Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-19860

Bluetooth Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB) Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole Tippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of University of Oxford, England Entry added August 13, 2019

Carbon Core Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-8661: Natalie Silvanovich of Google Project Zero

Core Data Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero

Core Data Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project Zero

Disk Management Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8697: ccpwd working with Trend Micro's Zero Day Initiative

FaceTime Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu

Found in Apps Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: This issue was addressed with improved checks. CVE-2019-8663: Natalie Silvanovich of Google Project Zero

Foundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project Zero

Grapher Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Graphics Drivers Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of Solita, Lilang Wu and Moony Li of Trend Micro's Mobile Security Research Team working with Trend Micro's Zero Day Initiative CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro Mobile Security Research Team working with Trend Micro's Zero Day Initiative

Heimdal Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An issue existed in Samba that may allow attackers to perform unauthorized actions by intercepting communications between services Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team and Catalyst

IOAcceleratorFamily Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8694: Arash Tohidi of Solita

libxslt Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to view sensitive information Description: A stack overflow was addressed with improved input validation. CVE-2019-13118: found by OSS-Fuzz

Quick Look Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An attacker may be able to trigger a use-after-free in an application deserializing an untrusted NSDictionary Description: This issue was addressed with improved checks. CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project Zero

Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8697: ccpwd working with Trend Micro's Zero Day Initiative

Siri Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero

Time Machine Available for: macOS Mojave 10.14.5 Impact: The encryption status of a Time Machine backup may be incorrect Description: An inconsistent user interface issue was addressed with improved state management. CVE-2019-8667: Roland Kletzing of cyber:con GmbH

UIFoundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Additional recognition

Classroom We would like to acknowledge Jeff Johnson of underpassapp.com for their assistance.

Game Center We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of Alibaba Inc. for their assistance.

Installation note:

macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----

iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAl1S688pHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3Hiog/+ PcWPEhxDpnU1ctoVPhyoqkV1tUs8z3hdNyX/tPtQZIQVFB7No1Md0GX8Zrv2libb LwrbU25ewe82XE9Es6ngxTdkRaREn8+hm9gxYPCMDXyKRlv904Q1b4zthYUt7/NO 7RG6ZRHEINOQORzrDsmgT/X6TukIy73HNob+4xZJTdJe9ZU3/zDCaqUgyUJSodou vsVFR3oqkwbVby4eT9+YbxJWMvVoFfB1+Qqo1w9kN7WXcYK3gb7sGtnNQlrE70kR pLRogcmwTQsi+sTm8bxQsuXXjdtTHeeCf0FRJg8NY5wZmdV9lNOghtmNxfTwIuir VeWusIgZWaK7IbgHW3PRYv3Sbrk40zcOraDsPv2rdgjOj4ReVyKHw5/f5Fyhcn+v WnIC4iNIBurz0HZU91QqD58Sqp+HtWl8xkM3ZW+Kd9LjnLty3fNw6Au5Aw8DTHzN 5F+lz7JRVV3+j7AYELog3WV6mdzMKW85gJRJtwXJ8hHSYZnvat06faFlPcDiKjBW rW7BehRykZpmZtaSZjL25IeOuXJHHdRfvabuTZ3nk47SSn7EJJ3xFBnvw6TgVFX+ TvmcUg5FinTSR81NkIY0ux6x1kuV/4vIUGZ4O0Houf/FoUhMQvig9ZkSw2B+Ynbd Xl3qBT4SVPWQyFAvjHwjCZA+GpNsnEKgZm8SlYVgqog= =tCwo -----END PGP SIGNATURE----- .

Bug Fix(es):

  • kernel-rt: update to the RHEL7.7.z batch#2 source tree (BZ#1748570)

  • -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:3187-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3187 Issue date: 2019-10-23 CVE Names: CVE-2019-9506 =====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Fix possible Spectre-v1 bugs in wireless code (BZ#1706696)

  • powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM) (BZ#1745436)

  • powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1745438)

  • ISST-LTE:PVM:Zeppelin :LPM: Failure logs and stack trace seen during LPM (POWER9/P9) (BZ#1745446)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.4):

Source: kernel-3.10.0-693.60.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm kernel-doc-3.10.0-693.60.1.el7.noarch.rpm

x86_64: kernel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-headers-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm perf-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.4):

Source: kernel-3.10.0-693.60.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm kernel-doc-3.10.0-693.60.1.el7.noarch.rpm

ppc64le: kernel-3.10.0-693.60.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.60.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.60.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.60.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.60.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.60.1.el7.ppc64le.rpm perf-3.10.0-693.60.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm python-perf-3.10.0-693.60.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm

x86_64: kernel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-headers-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm perf-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.4):

Source: kernel-3.10.0-693.60.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm kernel-doc-3.10.0-693.60.1.el7.noarch.rpm

x86_64: kernel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-devel-3.10.0-693.60.1.el7.x86_64.rpm kernel-headers-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm perf-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 7.4):

x86_64: kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional E4S (v. 7.4):

ppc64le: kernel-debug-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.60.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.60.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm

x86_64: kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional TUS (v. 7.4):

x86_64: kernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2019-9506 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXbAXitzjgjWX9erEAQh25A/9FrjeF3eVkgGwc/RvTRPF/Qqb44x+l61E KceVqzr3avw9TDoiCA8e35ZYwNBvpN6YW/VDiI0vSyj2nQp57xFK48ybhUvXGUKL A2dXn793a3ZBKIp4wVVQKyjBsAI31MT/AZDKrzlugszWlV25u/mc2tC4Yndbe+8e Lbwf2VvKdvtlH26Cadv1UN9YsnmtQuNdGp9NrRbttTCW9rMmHtkoQ/yT4rcS/7Fl 1tu2j2Yoi0GEG9wXWda7cbpd2jLCcpjwIYnrjRNOuMNVSugRKRcAY1rMwpL5dVpA rx2bi3X3HhCpGTgZSJbl9fz2f1J71o9WoUSybaT36Uc50iOs7anoHc82XPGFvkak xg+mkIVNkwGxW9pkum8tZANjhDwyGJl0bpS98zkzpNiBqdrGdN4V9qMmhqmEa/lT lQ7haJR1rqboIzS5uSpTL/a79blwDjnMNsZ3D+c6xFfjsq8yu1zGfDWBbMdoc1Zo 3CNT4+pdBr5ASdlE7R3G+8Zx77WSK2MLxRnzzHBF6KphF4LOOUJmefpZ0KQRGkN8 zOKjvsynVKSzqt++WJrij+U74KL65PZokF8kKSc0yDhgYRaeqK6QIwe+Dbn/YUsn RNBi1ZoILHB9nMxbT5OlEVf/0EJl7oD1zINT0n7S8b86gRnfHdMLlvZ1Kcfjs0Sy Vdo262+aA6k= =FkCN -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-1958",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cornell-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c01e333r1p1t8\\)"
      },
      {
        "model": "p30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "lelandp-l22d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "leland-tl10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "columbia-tl00d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.1.0.186\\(c01gt\\)"
      },
      {
        "model": "y6 2019",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "19.04"
      },
      {
        "model": "tvos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "12.4"
      },
      {
        "model": "cairogo-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "cairogo-l22c461b153"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "princeton-tl10c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.338\\(c185e3r3p1\\)"
      },
      {
        "model": "princeton-al10d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.341\\(c185e1r1p9t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c185e2r1p12t8\\)"
      },
      {
        "model": "leland-l32c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "yale-tl00b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e3r1p14t8\\)"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.12.6"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.307\\(c635e4r1p13t8\\)"
      },
      {
        "model": "virtualization host eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "4.2"
      },
      {
        "model": "nova 3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "laya-al00ep",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.306\\(c432e4r1p11t8\\)"
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.158\\(c432e8r1p5t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c782e10r1p9t8\\)"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.332\\(c432e5r1p13t8\\)"
      },
      {
        "model": "lelandp-l22c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ares-al10d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.160\\(c00e160r2p5t8\\)"
      },
      {
        "model": "y6 prime 2018",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydney-l21",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "cornell-al00ind",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.2.0.141\\(c675custc675d1gt\\)"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "15.0"
      },
      {
        "model": "paris-al00ic",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "atomu-l42",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.155\\(c636custc636d1\\)"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.155\\(c10e2r3p1\\)"
      },
      {
        "model": "madrid-tl00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "enterprise linux aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "enterprise linux for real time for nfv",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8"
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.150\\(c185e6r1p5t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c636e3r1p13t8\\)"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.137\\(c33e8r1p5t8\\)"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.171\\(c10e2r3p1\\)"
      },
      {
        "model": "leland-tl10c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "madrid-al00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cornell-al10ind",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.363\\(c675e2r1p9t8\\)"
      },
      {
        "model": "nova 5i pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "jakarta-al00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "yale-l21a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cornell-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "nova lite 3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.172\\(c432e2r5p1\\)"
      },
      {
        "model": "enterprise linux tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.336\\(c636e2r1p12t8\\)"
      },
      {
        "model": "enterprise linux for real time",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "sydney-l22",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dura-tl00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "1.0.0.176\\(c01\\)"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "y9 2019",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "potter-al00c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "florida-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.128\\(c01e112r1p6t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "lelandp-al10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-tl10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c01e333r1p1t8\\)"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "p30 pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.342\\(c461e1r1p9t8\\)"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "figo-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.160\\(c605e6r1p5t8\\)"
      },
      {
        "model": "imanager neteco 6000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c636e4r1p13t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c432e7r1p11t8\\)"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c432e2r5p1\\)"
      },
      {
        "model": "tony-tl00b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "harry-al00c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "florida-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.150\\(c636e6r1p5t8\\)"
      },
      {
        "model": "honor 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.149\\(c675e8r2p1\\)"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.170\\(c185e2r5p1\\)"
      },
      {
        "model": "nova 5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "leland-l42c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor 8a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "lelandp-al10d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "figo-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c01e115r2p8t8\\)"
      },
      {
        "model": "tony-al00b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.306\\(c185e2r1p13t8\\)"
      },
      {
        "model": "london-al40ind",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "harry-al10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "johnson-tl00d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "alp-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.326\\(c635e2r1p11t8\\)"
      },
      {
        "model": "p smart",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.1"
      },
      {
        "model": "asoka-al00ax",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.1.181\\(c00e48r6p1\\)"
      },
      {
        "model": "columbia-al10i",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.335\\(c675e8r1p9t8\\)"
      },
      {
        "model": "sydneym-l23",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ares-tl00c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.165\\(c01e165r2p5t8\\)"
      },
      {
        "model": "enterprise linux for real time for nfv eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.347\\(c432e1r1p9t8\\)"
      },
      {
        "model": "enterprise linux for real time eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "katyusha-al00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "paris-l29b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydneym-l01",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "florida-al20b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.128\\(c00e112r1p6t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c185e3r1p12t8\\)"
      },
      {
        "model": "potter-al10a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "yale-l61c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "iphone os",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "12.4"
      },
      {
        "model": "sydney-l22br",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydneym-al00",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c432e5r1p9t8\\)"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.170\\(c636e2r3p1\\)"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "dubai-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.2.0.190\\(c00r2p2\\)"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "google",
        "version": null
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c605e2r1p11t8\\)"
      },
      {
        "model": "honor 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.143\\(c675e8r2p1\\)"
      },
      {
        "model": "hima-l29c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "atomu-l33",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.147\\(c605custc605d1\\)"
      },
      {
        "model": "enterprise linux for real time for nfv",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "bla-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.329\\(c01e320r1p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c636e7r1p13t8\\)"
      },
      {
        "model": "dura-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "1.0.0.182\\(c00\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c636e2r1p12t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.1.0.156\\(c605\\)"
      },
      {
        "model": "p smart 2019",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.14.5"
      },
      {
        "model": "harry-tl00c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux for real time",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8"
      },
      {
        "model": "y6 pro 2019",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor view 10",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-al20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "johnson-tl00f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.122\\(c09e7r1p5t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e5r1p14t8\\)"
      },
      {
        "model": "yalep-al10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "florida-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c605e7r1p2t8\\)"
      },
      {
        "model": "yale-al50a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c461e2r1p11t8\\)"
      },
      {
        "model": "enterprise linux for real time for nfv eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "enterprise linux for real time eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "honor 8x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "figo-l31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.122d\\(c652\\)"
      },
      {
        "model": "mate 20 x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cornell-al00i",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.363\\(c675e3r1p9t8\\)"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "nova 4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "leland-l42a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydney-al00",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.165\\(c10e8r1p5t8\\)"
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c636e2r3p1\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c461e3r1p11t8\\)"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "leland-l32a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "neo-al00d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydneym-l03",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c185e2r5p1\\)"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.13.6"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.300\\(c605e2r1p12t8\\)"
      },
      {
        "model": "lelandp-l22a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c185e4r1p11t8\\)"
      },
      {
        "model": "leland-l31a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "atomu-l41",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.153\\(c461custc461d1\\)"
      },
      {
        "model": "imanager neteco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "paris-l21b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "mate 20 pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mrg realtime",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "2.0"
      },
      {
        "model": "y5 2018",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "yale-al00a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydney-tl00",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.306\\(c636e2r1p13t8\\)"
      },
      {
        "model": "lelandp-al00c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydney-l21br",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "columbia-al10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "p20 pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor view 20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "barca-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.366\\(c00\\)"
      },
      {
        "model": "leland-l21a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "paris-l21meb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "princeton-al10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.150\\(c432e6r1p5t8\\)"
      },
      {
        "model": "ares-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.160\\(c00e160r2p5t8\\)"
      },
      {
        "model": "mate 20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "watchos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "5.3"
      },
      {
        "model": "honor 10 lite",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "y5 lite",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.329\\(c786e320r2p1t8\\)"
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.137\\(c530e8r1p5t8\\)"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "15.1"
      },
      {
        "model": "y7 2019",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydneym-l21",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "blackberry",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "bluetooth sig",
        "version": null
      },
      {
        "model": "br/edr core",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "bluetooth sig",
        "version": "v5.1"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:misc:bluetooth_br_edr_core",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "db": "PACKETSTORM",
        "id": "154949"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2019-9506",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2019-9506",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 7.8,
            "collateralDamagePotential": "NOT DEFINED",
            "confidentialityImpact": "COMPLETE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 7.8,
            "exploitability": "NOT DEFINED",
            "exploitabilityScore": 6.5,
            "id": "CVE-2019-9506",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "NOT DEFINED",
            "reportConfidence": "NOT DEFINED",
            "severity": "HIGH",
            "targetDistribution": "NOT DEFINED",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:A/AC:L/Au:N/C:C/I:C/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "VHN-160941",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-9506",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "cret@cert.org",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-9506",
            "impactScore": 4.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-9506",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "cret@cert.org",
            "id": "CVE-2019-9506",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-9506",
            "trust": 0.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201908-864",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-160941",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-9506",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing. Bluetooth BR/EDR The entropy negotiation of the encryption key used for encryption on the connection has a problem that is vulnerable to man-in-the-middle attacks by design. A third party Bluetooth BR/EDR The entropy of the encryption key used for communication 1 Force byte (Key Negotiation Of Bluetooth (KNOB) attack) Brute force attacks on subsequent communications (Brute force attack) May be able to decrypt and intercept the contents. Bluetooth Is Bluetooth Basic Rate / Enhanced Data Rate (Bluetooth BR/EDR) Includes core configuration 6 A short-range wireless technology based on different core specifications and used for low-power short-range communications. Bluetooth To establish encrypted communication for 2 Horn Bluetooth You need to establish a link key that the device will pair and use to generate the encryption key used for encryption at the link layer. The entropy of the encryption key is 1 From bytes 16 In bytes length Bluetooth Set between controllers. When an attacker interrupts the encryption key entropy setting request between controllers and each controller accepts a low entropy setting, encrypted communication with low entropy is forced, resulting in a brute force attack (Brute force attack) Because of this, communication between devices may be easily decrypted.Man-in-the-middle attacks (man-in-the-middle attack) There is a possibility of eavesdropping on encrypted communication by. An encryption issue vulnerability exists in Bluetooth BR/EDR 5.1 and earlier versions. The vulnerability stems from incorrect use of relevant cryptographic algorithms by network systems or products, resulting in improperly encrypted content, weak encryption, and storing sensitive information in plain text. The attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked. \nThis advisory will be updated as additional information becomes available. There are no workarounds that address this vulnerability. \n\nThis advisory is available at the following link:\ntools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth. 8.0) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers (BZ#1739184)\n\n* TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)\n\n* RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test\n(Marvell/Cavium/QLogic) (L3:) (BZ#1743548)\n\n* block: blk-mq improvement (BZ#1780567)\n\n* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during\nRHEL8.0 validation for SAP HANA on POWER (BZ#1781111)\n\n* blk-mq: overwirte performance drops on real MQ device (BZ#1782183)\n\n* RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads\nto drain out system memory quickly. (BZ#1782705)\n\n4. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nSecurity Fix(es):\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS\n(CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)\n(CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in\ndrivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: Information Disclosure in crypto_report_one in\ncrypto/crypto_user.c (CVE-2018-19854)\n\n* kernel: usb: missing size check in the __usb_get_extra_descriptor()\nleading to DoS (CVE-2018-20169)\n\n* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT\n(CVE-2019-3459)\n\n* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP\n(CVE-2019-3460)\n\n* kernel: SCTP socket buffer memory leak leading to denial of service\n(CVE-2019-3874)\n\n* kernel: denial of service vector through vfio DMA mappings\n(CVE-2019-3882)\n\n* kernel: null-pointer dereference in hci_uart_set_flow_control\n(CVE-2019-10207)\n\n* kernel: fix race condition between mmget_not_zero()/get_task_mm() and\ncore dumping (CVE-2019-11599)\n\n* kernel: fs/ext4/extents.c leads to information disclosure\n(CVE-2019-11833)\n\n* kernel: sensitive information disclosure from kernel stack memory via\nHIDPCONNADD command (CVE-2019-11884)\n\n* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)\n\n* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c\nleads to denial of service (CVE-2019-15916)\n\n* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c\n(CVE-2018-19985)\n\n* Kernel: KVM: leak of uninitialized stack contents to guest\n(CVE-2019-7222)\n\n* Kernel: net: weak IP ID generation leads to remote device tracking\n(CVE-2019-10638)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n1656986 - CVE-2018-19854 kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c\n1660375 - CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common()\n1660385 - CVE-2018-20169 kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS\n1663176 - CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT\n1663179 - CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP\n1664110 - CVE-2019-5489 Kernel: page cache side channel attacks\n1666106 - CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c\n1671930 - CVE-2019-7222 Kernel: KVM: leak of uninitialized stack contents to guest\n1678887 - RT: update RT source tree to the RHEL-8.1 tree\n1686373 - CVE-2019-3874 kernel: SCTP socket buffer memory leak leading to denial of service\n1689426 - CVE-2019-3882 kernel: denial of service vector through vfio DMA mappings\n1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS\n1700666 - Make kernel-rt require rt-setup\n1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping\n1709837 - CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command\n1712072 - CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure\n1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c\n1724657 - BUG: scheduling while atomic in zswap\n1727756 - CVE-2019-13233 kernel: use-after-free in arch/x86/lib/insn-eval.c\n1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)\n1728765 - BUG: scheduling while atomic: rcuc/13/134/0x00000002\n1729931 - CVE-2019-10638 Kernel: net: weak IP ID generation leads to remote device tracking\n1733472 - BUG: scheduling while atomic: rcuc/1/24/0x00000002\n1733874 - CVE-2019-10207 kernel: null-pointer dereference in hci_uart_set_flow_control\n1743931 - BUG: unable to handle kernel NULL pointer dereference at 0000000000000020\n1745646 - [RT] sched/fair: Robustify CFS-bandwidth timer locking\n1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer\n1750813 - CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service\n\n6. \n\nBug Fix(es):\n\n* port show-kabi to python3 (BZ#1806924)\n\n4. 7.6) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nBug Fix(es):\n\n* kernel build: parallelize redhat/mod-sign.sh (BZ#1755326)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2019-8-13-1 Additional information for\nAPPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update\n2019-004 High Sierra, Security Update 2019-004 Sierra\n\nmacOS Mojave 10.14.6, Security Update 2019-004 High Sierra,\nSecurity Update 2019-004 Sierra address the\nfollowing:\n\nAppleGraphicsControl\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2019-8693: Arash Tohidi of Solita\n\nautofs\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: Extracting a zip file containing a symbolic link to an\nendpoint in an NFS mount that is attacker controlled may bypass\nGatekeeper\nDescription: This was addressed with additional checks by Gatekeeper\non files mounted through a network share. \nCVE-2019-8656: Filippo Cavallarin\n\nBluetooth\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-19860\n\nBluetooth\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB)\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole\nTippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of\nUniversity of Oxford, England\nEntry added August 13, 2019\n\nCarbon Core\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2019-8661: Natalie Silvanovich of Google Project Zero\n\nCore Data\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nCore Data\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8660: Samuel Gro\u00df and Natalie Silvanovich of Google Project\nZero\n\nDisk Management\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8697: ccpwd working with Trend Micro\u0027s Zero Day Initiative\n\nFaceTime\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu\n\nFound in Apps\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: This issue was addressed with improved checks. \nCVE-2019-8663: Natalie Silvanovich of Google Project Zero\n\nFoundation\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8641: Samuel Gro\u00df and Natalie Silvanovich of Google Project\nZero\n\nGrapher\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8695: riusksk of VulWar Corp working with Trend Micro\u0027s Zero\nDay Initiative\n\nGraphics Drivers\nAvailable for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of\nSolita, Lilang Wu and Moony Li of Trend Micro\u0027s Mobile Security\nResearch Team working with Trend Micro\u0027s Zero Day Initiative\nCVE-2019-8692: Lilang Wu and Moony Li of Trend Micro Mobile Security\nResearch Team working with Trend Micro\u0027s Zero Day Initiative\n\nHeimdal\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An issue existed in Samba that may allow attackers to perform\nunauthorized actions by intercepting communications between services\nDescription: This issue was addressed with improved checks to prevent\nunauthorized actions. \nCVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team\nand Catalyst\n\nIOAcceleratorFamily\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8694: Arash Tohidi of Solita\n\nlibxslt\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to view sensitive information\nDescription: A stack overflow was addressed with improved input\nvalidation. \nCVE-2019-13118: found by OSS-Fuzz\n\nQuick Look\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An attacker may be able to trigger a use-after-free in an\napplication deserializing an untrusted NSDictionary\nDescription: This issue was addressed with improved checks. \nCVE-2019-8662: Natalie Silvanovich and Samuel Gro\u00df of Google Project\nZero\n\nSecurity\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8697: ccpwd working with Trend Micro\u0027s Zero Day Initiative\n\nSiri\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nTime Machine\nAvailable for: macOS Mojave 10.14.5\nImpact: The encryption status of a Time Machine backup may be\nincorrect\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2019-8667: Roland Kletzing of cyber:con GmbH\n\nUIFoundation\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8657: riusksk of VulWar Corp working with Trend Micro\u0027s Zero\nDay Initiative\n\nAdditional recognition\n\nClassroom\nWe would like to acknowledge Jeff Johnson of underpassapp.com for\ntheir assistance. \n\nGame Center\nWe would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of\nAlibaba Inc. for their assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14.6, Security Update 2019-004 High Sierra,\nSecurity Update 2019-004 Sierra may be obtained from the\nMac App Store or Apple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nXl3qBT4SVPWQyFAvjHwjCZA+GpNsnEKgZm8SlYVgqog=\n=tCwo\n-----END PGP SIGNATURE-----\n. \n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL7.7.z batch#2 source tree (BZ#1748570)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2019:3187-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:3187\nIssue date:        2019-10-23\nCVE Names:         CVE-2019-9506 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.4\nAdvanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update\nSupport, and Red Hat Enterprise Linux 7.4 Update Services for SAP\nSolutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)\n(CVE-2019-9506)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Fix possible Spectre-v1 bugs in wireless code (BZ#1706696)\n\n* powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas:\nFix a potential race between CPU-Offline \u0026 Migration (LPM) (BZ#1745436)\n\n* powerpc/pseries: Fix unitialized timer reset on migration /\npowerpc/pseries/mobility: Extend start/stop topology update scope (LPM)\n(BZ#1745438)\n\n* ISST-LTE:PVM:Zeppelin :LPM: Failure logs and stack trace seen during LPM\n(POWER9/P9) (BZ#1745446)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.60.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.60.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm\nperf-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.4):\n\nSource:\nkernel-3.10.0-693.60.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.60.1.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-693.60.1.el7.ppc64le.rpm\nperf-3.10.0-693.60.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\npython-perf-3.10.0-693.60.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm\nperf-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.4):\n\nSource:\nkernel-3.10.0-693.60.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-693.60.1.el7.noarch.rpm\nkernel-doc-3.10.0-693.60.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-devel-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-headers-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-693.60.1.el7.x86_64.rpm\nperf-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4):\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-693.60.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-693.60.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-693.60.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-9506\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nVdo262+aA6k=\n=FkCN\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      },
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "db": "PACKETSTORM",
        "id": "154054"
      },
      {
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "db": "PACKETSTORM",
        "id": "154949"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-9506",
        "trust": 3.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#918987",
        "trust": 3.4
      },
      {
        "db": "PACKETSTORM",
        "id": "157216",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90240762",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156058",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0141",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1366",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1189",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1366.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4346",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4346.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4676",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0262",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3115",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4252",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1338",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4584",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-27173",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "155017",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "154949",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "154936",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "155004",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "155121",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "154054",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "154879",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "db": "PACKETSTORM",
        "id": "154054"
      },
      {
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "db": "PACKETSTORM",
        "id": "154949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "id": "VAR-201908-1958",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      }
    ],
    "trust": 0.6336539924999999
  },
  "last_update_date": "2025-12-22T22:47:45.218000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Key Negotiation of Bluetooth",
        "trust": 0.8,
        "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
      },
      {
        "title": "The building blocks of all Bluetooth devices",
        "trust": 0.8,
        "url": "https://www.bluetooth.com/specifications/"
      },
      {
        "title": "Keep up to date with Errata",
        "trust": 0.8,
        "url": "https://www.bluetooth.com/specifications/errata/"
      },
      {
        "title": "Bluetooth Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96553"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/08/22/cisco_patch_bundle/"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193187 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kpatch-patch security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193231 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192975 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193165 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193218 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201460 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193220 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193089 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193055 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-alt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193217 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kpatch-patch security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193076 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2019-9506",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2019-9506"
      },
      {
        "title": "Cisco: Key Negotiation of Bluetooth Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20190813-bluetooth"
      },
      {
        "title": "HP: HPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03634"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200204 - Security Advisory"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=814c3d5b0bc03fc1c34e62dbc5cf6bf7"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=20bba81176880ee641f9d46354adc125"
      },
      {
        "title": "Red Hat: Important: kernel security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193517 - Security Advisory"
      },
      {
        "title": "Huawei Security Advisories: Security Advisory - Key Negotiation of Bluetooth (KNOB) Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=4da976eef66883f5331725800e5cf063"
      },
      {
        "title": "Red Hat: Important: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20193309 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-gke-5.0, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4147-1"
      },
      {
        "title": "Fortinet Security Advisories: CVE-2019-9506 Encryption Key Negotiation of Bluetooth Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-224"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2 regression",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4115-2"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4115-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-aws vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4118-1"
      },
      {
        "title": "knob",
        "trust": 0.1,
        "url": "https://github.com/francozappa/knob "
      },
      {
        "title": "bluetooth-KNOB",
        "trust": 0.1,
        "url": "https://github.com/u10427687/bluetooth-KNOB "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/makaubenson/Fix-BT-Ubuntu "
      },
      {
        "title": "broadcom-bt-firmware",
        "trust": 0.1,
        "url": "https://github.com/winterheart/broadcom-bt-firmware "
      },
      {
        "title": "broadcom-bt-firmware",
        "trust": 0.1,
        "url": "https://github.com/AlexandrBing/broadcom-bt-firmware "
      },
      {
        "title": "Protocol-Vul",
        "trust": 0.1,
        "url": "https://github.com/WinMin/Protocol-Vul "
      },
      {
        "title": "awesome-bluetooth-security",
        "trust": 0.1,
        "url": "https://github.com/engn33r/awesome-bluetooth-security "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/JeffroMF/awesome-bluetooth-security321 "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/developer3000S/PoC-in-GitHub "
      },
      {
        "title": "CVE-POC",
        "trust": 0.1,
        "url": "https://github.com/0xT11/CVE-POC "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/hectorgie/PoC-in-GitHub "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/nomi-sec/PoC-in-GitHub "
      },
      {
        "title": "Symantec Threat Intelligence Blog",
        "trust": 0.1,
        "url": "https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-august-2019"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/cisco-patches-six-critical-bugs/147585/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/lenovo-warns-bugs-thinkpads/147338/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/wormable-remote-desktop-bugs-august-patch-tuesday/147302/"
      },
      {
        "title": "BleepingComputer",
        "trust": 0.1,
        "url": "https://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/"
      },
      {
        "title": "BleepingComputer",
        "trust": 0.1,
        "url": "https://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-connections/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-327",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://www.kb.cert.org/vuls/id/918987/"
      },
      {
        "trust": 2.6,
        "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
      },
      {
        "trust": 2.5,
        "url": "https://access.redhat.com/errata/rhsa-2020:0204"
      },
      {
        "trust": 2.0,
        "url": "https://access.redhat.com/errata/rhsa-2019:3187"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:3089"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:3165"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:3218"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:3231"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:3309"
      },
      {
        "trust": 1.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
      },
      {
        "trust": 1.8,
        "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2019/aug/11"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2019/aug/13"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2019/aug/14"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2019/aug/15"
      },
      {
        "trust": 1.8,
        "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:2975"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:3055"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:3076"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:3217"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:3220"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:3517"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4115-1/"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4118-1/"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4147-1/"
      },
      {
        "trust": 1.6,
        "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9506"
      },
      {
        "trust": 0.9,
        "url": "https://github.com/francozappa/knob"
      },
      {
        "trust": 0.8,
        "url": "https://www.bluetooth.com/specifications/adopted-specifications"
      },
      {
        "trust": 0.8,
        "url": "https://www.usenix.org/system/files/sec19-antonioli.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://www.icasi.org/br-edr-encryption-key-bluetooth-vulnerability/"
      },
      {
        "trust": 0.8,
        "url": "http://support.blackberry.com/kb/articledetail?articlenumber=000057251"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.8,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2019-9506"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9506"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90240762/"
      },
      {
        "trust": 0.7,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190813-bluetooth"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/157216/red-hat-security-advisory-2020-1460-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1338/"
      },
      {
        "trust": 0.6,
        "url": "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-9506"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-27173"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht210353"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4676/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4346/"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht210346"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4252/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4584/"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190828-01-knob-cn"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0141/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0262/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156058/red-hat-security-advisory-2020-0204-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3115/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/bluetooth-br-edr-information-disclosure-via-key-negotiation-30041"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4346.2/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1189/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1366/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1366.2/"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-10126"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5489"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-16884"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-14821"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-5489"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16884"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-3900"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/327.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.kb.cert.org/vuls/id/918987"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0154"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-0154"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12207"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-11135"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0155"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-0155"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14901"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14901"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-12207"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11135"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-11884"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11884"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3459"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-7222"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3874"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-10207"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-19985"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-13233"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19854"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10207"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3882"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11599"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3874"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13233"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-11599"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20169"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-20169"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-15916"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3460"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3460"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-10638"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7222"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19985"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11833"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-19854"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15916"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3882"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-11833"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3459"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:1460"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8691"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16860"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8695"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8692"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8646"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8694"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13118"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8693"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8663"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8656"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8648"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8641"
      },
      {
        "trust": 0.1,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8660"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8657"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8667"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19860"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8697"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8662"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8661"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3846"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20856"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3846"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-20856"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "db": "PACKETSTORM",
        "id": "154054"
      },
      {
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "db": "PACKETSTORM",
        "id": "154949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "db": "PACKETSTORM",
        "id": "154054"
      },
      {
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "db": "PACKETSTORM",
        "id": "154949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "date": "2020-01-23T00:26:55",
        "db": "PACKETSTORM",
        "id": "156058"
      },
      {
        "date": "2019-11-06T15:33:55",
        "db": "PACKETSTORM",
        "id": "155121"
      },
      {
        "date": "2020-04-14T15:40:41",
        "db": "PACKETSTORM",
        "id": "157216"
      },
      {
        "date": "2019-10-29T14:59:12",
        "db": "PACKETSTORM",
        "id": "155017"
      },
      {
        "date": "2019-10-29T14:48:28",
        "db": "PACKETSTORM",
        "id": "155004"
      },
      {
        "date": "2019-08-14T18:32:22",
        "db": "PACKETSTORM",
        "id": "154054"
      },
      {
        "date": "2019-10-16T15:06:37",
        "db": "PACKETSTORM",
        "id": "154879"
      },
      {
        "date": "2019-10-22T17:27:00",
        "db": "PACKETSTORM",
        "id": "154936"
      },
      {
        "date": "2019-10-23T18:29:02",
        "db": "PACKETSTORM",
        "id": "154949"
      },
      {
        "date": "2019-08-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "date": "2019-08-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "date": "2019-08-14T17:15:11.597000",
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#918987"
      },
      {
        "date": "2021-11-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-160941"
      },
      {
        "date": "2021-11-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-9506"
      },
      {
        "date": "2021-11-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      },
      {
        "date": "2019-08-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007618"
      },
      {
        "date": "2024-11-21T04:51:45.113000",
        "db": "NVD",
        "id": "CVE-2019-9506"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Bluetooth BR/EDR supported devices are vulnerable to key negotiation attacks",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#918987"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-864"
      }
    ],
    "trust": 0.6
  }
}

VAR-201910-0902

Vulnerability from variot - Updated: 2025-11-18 12:23

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095. Android Contains a vulnerability in the use of freed memory. This vulnerability Android ID: A-141720095 It is published asInformation is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

[slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)

New kernel packages are available for Slackware 14.2 to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/linux-4.4.199/: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 4.4.191: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117 Fixed in 4.4.193: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835 Fixed in 4.4.194: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821 Fixed in 4.4.195: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054 Fixed in 4.4.196: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215 Fixed in 4.4.197: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976 Fixed in 4.4.198: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133 Fixed in 4.4.199: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098 ( Security fix *) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199_smp-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-smp-4.4.199_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199_smp-noarch-1.txz

Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199-noarch-1.txz

MD5 signatures: +-------------+

Slackware 14.2 packages:

0e523f42e759ecc2399f36e37672f110 kernel-generic-4.4.199-i586-1.txz ee6451f5362008b46fee2e08e3077b21 kernel-generic-smp-4.4.199_smp-i686-1.txz a8338ef88f2e3ea9c74d564c36ccd420 kernel-headers-4.4.199_smp-x86-1.txz cd9e9c241e4eec2fba1dae658a28870e kernel-huge-4.4.199-i586-1.txz 842030890a424023817d42a83a86a7f4 kernel-huge-smp-4.4.199_smp-i686-1.txz 257db024bb4501548ac9118dbd2d9ae6 kernel-modules-4.4.199-i586-1.txz 96377cbaf7bca55aaca70358c63151a7 kernel-modules-smp-4.4.199_smp-i686-1.txz 0673e86466f9e624964d95107cf6712f kernel-source-4.4.199_smp-noarch-1.txz

Slackware x86_64 14.2 packages: 6d1ff428e7cad6caa8860acc402447a1 kernel-generic-4.4.199-x86_64-1.txz dadc091dc725b8227e0d1e35098d6416 kernel-headers-4.4.199-x86-1.txz f5f4c034203f44dd1513ad3504c42515 kernel-huge-4.4.199-x86_64-1.txz a5337cd8b2ca80d4d93b9e9688e42b03 kernel-modules-4.4.199-x86_64-1.txz 5dd6e46c04f37b97062dc9e52cc38add kernel-source-4.4.199-noarch-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg kernel-*.txz

If you are using an initrd, you'll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):

/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):

/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199 | bash

Please note that "uniprocessor" has to do with the kernel you are running, not with the CPU. Most systems should run the SMP kernel (if they can) regardless of the number of cores the CPU has. If you aren't sure which kernel you are running, run "uname -a". If you see SMP there, you are running the SMP kernel and should use the 4.4.199-smp version when running mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit systems should always use 4.4.199 as the version.

If you are using lilo or elilo to boot the machine, you'll need to ensure that the machine is properly prepared before rebooting.

If using LILO: By default, lilo.conf contains an image= line that references a symlink that always points to the correct kernel. No editing should be required unless your machine uses a custom lilo.conf. If that is the case, be sure that the image= line references the correct kernel file. Either way, you'll need to run "lilo" as root to reinstall the boot loader.

If using elilo: Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish to use, and then run eliloconfig to update the EFI System Partition.

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAl3Ej4wACgkQakRjwEAQIjPBGgCbBvQSowDI1fl2+9FnjAuXifIV qp4AoIBHeQ0arALUOqrVAfv+sZvRsiwu =/1NF -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-4186-3 November 13, 2019

linux vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. This update addresses the issue.

We apologize for the inconvenience.

Original advisory details:

Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135)

It was discovered that the Intel i915 graphics chipsets allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and expose kernel memory information. A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2019-0155)

Deepak Gupta discovered that on certain Intel processors, the Linux kernel did not properly perform invalidation on page table updates by virtual guest operating systems. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2018-12207)

It was discovered that the Intel i915 graphics chipsets could cause a system hang when userspace performed a read from GT memory mapped input output (MMIO) when the product is in certain low power states. A local attacker could use this to cause a denial of service. (CVE-2019-0154)

Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver for the Linux kernel did not properly validate endpoint descriptors returned by the device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15098)

It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)

Ori Nimron discovered that the AX25 network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17052)

Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17053)

Ori Nimron discovered that the Appletalk network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17054)

Ori Nimron discovered that the modular ISDN network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17055)

Ori Nimron discovered that the Near field Communication (NFC) network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17056)

Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi driver for the Linux kernel when handling Notice of Absence frames. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-17666)

Maddie Stone discovered that the Binder IPC Driver implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-2215)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: linux-image-4.4.0-169-generic 4.4.0-169.198 linux-image-4.4.0-169-generic-lpae 4.4.0-169.198 linux-image-4.4.0-169-lowlatency 4.4.0-169.198 linux-image-generic 4.4.0.169.177 linux-image-generic-lpae 4.4.0.169.177 linux-image-lowlatency 4.4.0.169.177 linux-image-virtual 4.4.0.169.177

Please note that mitigating the TSX (CVE-2019-11135) and i915 (CVE-2019-0154) issues requires corresponding microcode and graphics firmware updates respectively.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References: https://usn.ubuntu.com/4186-3 https://usn.ubuntu.com/4186-1 CVE-2019-0155, https://bugs.launchpad.net/bugs/1852141

Package Information: https://launchpad.net/ubuntu/+source/linux/4.4.0-169.198

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0902",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nova 3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c00e351r1p1t8\\)"
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c605e7r1p2t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.200\\(c635e5r1p1t8\\)"
      },
      {
        "model": "a320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "sydneym-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.212\\(c00e62r1p7t8\\)"
      },
      {
        "model": "leland-tl10c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c01e112r2p10t8\\)"
      },
      {
        "model": "florida-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.150\\(c636e6r1p5t8\\)"
      },
      {
        "model": "mate rs",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.321\\(c786e320r1p1t8\\)"
      },
      {
        "model": "hci management node",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "anne-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.126\\(c00e126r1p7t8\\)"
      },
      {
        "model": "florida-al20b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.128\\(c00e112r1p6t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.200\\(c636e4r1p5t8\\)"
      },
      {
        "model": "android",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "google",
        "version": null
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.200\\(c636e4r1p5t8\\)"
      },
      {
        "model": "princeton-al10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.1.0.160\\(c00e160r2p11\\)"
      },
      {
        "model": "nova 2s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.210\\(c01e110r1p9t8\\)"
      },
      {
        "model": "fas2750",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "lelandp-al00c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c00e112r2p10t8\\)"
      },
      {
        "model": "leland-al10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c00e112r2p10t8\\)"
      },
      {
        "model": "leland-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c01e112r2p10t8\\)"
      },
      {
        "model": "honor view 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.1.0.214\\(c10e5r4p3\\)"
      },
      {
        "model": "johnson-tl00d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.219\\(c01e18r3p2t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "yale-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.1.0.160\\(c01e160r8p12\\)"
      },
      {
        "model": "tony-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.175\\(c00e59r2p11\\)"
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "tony-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.175\\(c01e59r2p11\\)"
      },
      {
        "model": "ares-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.165\\(c00e165r2p5t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.200\\(c605e4r1p3t8\\)"
      },
      {
        "model": "c190",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.300\\(c432e4r1p11t8\\)"
      },
      {
        "model": "ares-al10d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.165\\(c00e165r2p5t8\\)"
      },
      {
        "model": "h410s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "bla-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.170\\(c786e170r2p4\\)"
      },
      {
        "model": "h700s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "duke-l09i",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.1.171\\(c675e6r1p5t8\\)"
      },
      {
        "model": "berkeley-tl10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c01e333r1p1t8\\)"
      },
      {
        "model": "lelandp-l22c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.156\\(c636e5r1p5t8\\)"
      },
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.1.0.231\\(c10e3r3p2\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.201\\(c636e4r1p5t8\\)"
      },
      {
        "model": "h500s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "florida-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.128\\(c01e112r1p6t8\\)"
      },
      {
        "model": "service processor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "a800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "ares-tl00chw",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.2.0.163\\(c01r2p1\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.201\\(c636e4r1p5t8\\)"
      },
      {
        "model": "figo-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c00e115r2p8t8\\)"
      },
      {
        "model": "columbia-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.1.0.186\\(c00gt\\)"
      },
      {
        "model": "dura-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "1.0.0.190\\(c00\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.246\\(c432e6r1p7t8\\)"
      },
      {
        "model": "stanford-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.211\\(c635e2r1p4t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.201\\(zafc185e4r1p8t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c432e4r1p12t8\\)"
      },
      {
        "model": "jakarta-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.260\\(c00e120r2p2\\)"
      },
      {
        "model": "rhone-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.376\\(c00\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.201\\(zafc185e4r1p8t8\\)"
      },
      {
        "model": "alp-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.162\\(c01e156r1p4\\)"
      },
      {
        "model": "h610s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "alp-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.162\\(c00e156r2p4\\)"
      },
      {
        "model": "yale-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.1.0.160\\(c00e160r8p12\\)"
      },
      {
        "model": "steelstore cloud integrated storage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "sydney-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.212\\(c00e62r1p7t8\\)"
      },
      {
        "model": "cornell-tl10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.321\\(c01e320r1p1t8\\)"
      },
      {
        "model": "sydney-tl00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.212\\(c01e62r1p7t8\\)"
      },
      {
        "model": "data availability services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h410c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "florida-l03",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c605e7r1p2t8\\)"
      },
      {
        "model": "honor 9i",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c00e112r2p10t8\\)"
      },
      {
        "model": "bla-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.170\\(c01e170r1p4\\)"
      },
      {
        "model": "y9 2019",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.297\\(c605e4r1p1t8\\)"
      },
      {
        "model": "leland-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.156\\(c185e5r1p5t8\\)"
      },
      {
        "model": "fas2720",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "p20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.312\\(c00e312r1p1t8\\)"
      },
      {
        "model": "a220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "barca-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.377\\(c00\\)"
      },
      {
        "model": "leland-l32a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.153\\(c675e6r1p4t8\\)"
      },
      {
        "model": "solidfire",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "h300s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "neo-al00d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.321\\(c786e320r1p1t8\\)"
      },
      {
        "model": "stanford-l09s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.210\\(c432e2r1p5t8\\)"
      },
      {
        "model": "aff baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "android",
        "scope": null,
        "trust": 0.8,
        "vendor": "google",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:google:android",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "PACKETSTORM",
        "id": "155335"
      }
    ],
    "trust": 0.2
  },
  "cve": "CVE-2019-2215",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2215",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2019-2215",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2215",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2215",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2019-2215",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2215",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201910-198",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-2215",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095. Android Contains a vulnerability in the use of freed memory. This vulnerability Android ID: A-141720095 It is published asInformation is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n[slackware-security]  Slackware 14.2 kernel (SSA:2019-311-01)\n\nNew kernel packages are available for Slackware 14.2 to fix security issues. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/linux-4.4.199/*:  Upgraded. \n  These updates fix various bugs and security issues. \n  Be sure to upgrade your initrd after upgrading the kernel packages. \n  If you use lilo to boot your machine, be sure lilo.conf points to the correct\n  kernel and initrd and run lilo as root to update the bootloader. \n  If you use elilo to boot your machine, you should run eliloconfig to copy the\n  kernel and initrd to the EFI System Partition. \n  For more information, see:\n    Fixed in 4.4.191:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117\n    Fixed in 4.4.193:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835\n    Fixed in 4.4.194:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821\n    Fixed in 4.4.195:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054\n    Fixed in 4.4.196:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215\n    Fixed in 4.4.197:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976\n    Fixed in 4.4.198:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133\n    Fixed in 4.4.199:\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199_smp-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-smp-4.4.199_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199_smp-noarch-1.txz\n\nUpdated packages for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199-noarch-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.2 packages:\n\n0e523f42e759ecc2399f36e37672f110  kernel-generic-4.4.199-i586-1.txz\nee6451f5362008b46fee2e08e3077b21  kernel-generic-smp-4.4.199_smp-i686-1.txz\na8338ef88f2e3ea9c74d564c36ccd420  kernel-headers-4.4.199_smp-x86-1.txz\ncd9e9c241e4eec2fba1dae658a28870e  kernel-huge-4.4.199-i586-1.txz\n842030890a424023817d42a83a86a7f4  kernel-huge-smp-4.4.199_smp-i686-1.txz\n257db024bb4501548ac9118dbd2d9ae6  kernel-modules-4.4.199-i586-1.txz\n96377cbaf7bca55aaca70358c63151a7  kernel-modules-smp-4.4.199_smp-i686-1.txz\n0673e86466f9e624964d95107cf6712f  kernel-source-4.4.199_smp-noarch-1.txz\n\nSlackware x86_64 14.2 packages:\n6d1ff428e7cad6caa8860acc402447a1  kernel-generic-4.4.199-x86_64-1.txz\ndadc091dc725b8227e0d1e35098d6416  kernel-headers-4.4.199-x86-1.txz\nf5f4c034203f44dd1513ad3504c42515  kernel-huge-4.4.199-x86_64-1.txz\na5337cd8b2ca80d4d93b9e9688e42b03  kernel-modules-4.4.199-x86_64-1.txz\n5dd6e46c04f37b97062dc9e52cc38add  kernel-source-4.4.199-noarch-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg kernel-*.txz\n\nIf you are using an initrd, you\u0027ll need to rebuild it. \n\nFor a 32-bit SMP machine, use this command (substitute the appropriate\nkernel version if you are not running Slackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199-smp | bash\n\nFor a 64-bit machine, or a 32-bit uniprocessor machine, use this command\n(substitute the appropriate kernel version if you are not running\nSlackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199 | bash\n\nPlease note that \"uniprocessor\" has to do with the kernel you are running,\nnot with the CPU. Most systems should run the SMP kernel (if they can)\nregardless of the number of cores the CPU has. If you aren\u0027t sure which\nkernel you are running, run \"uname -a\". If you see SMP there, you are\nrunning the SMP kernel and should use the 4.4.199-smp version when running\nmkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit\nsystems should always use 4.4.199 as the version. \n\nIf you are using lilo or elilo to boot the machine, you\u0027ll need to ensure\nthat the machine is properly prepared before rebooting. \n\nIf using LILO:\nBy default, lilo.conf contains an image= line that references a symlink\nthat always points to the correct kernel. No editing should be required\nunless your machine uses a custom lilo.conf. If that is the case, be sure\nthat the image= line references the correct kernel file.  Either way,\nyou\u0027ll need to run \"lilo\" as root to reinstall the boot loader. \n\nIf using elilo:\nEnsure that the /boot/vmlinuz symlink is pointing to the kernel you wish\nto use, and then run eliloconfig to update the EFI System Partition. \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address.      |\n+------------------------------------------------------------------------+\n-----BEGIN PGP SIGNATURE-----\n\niEYEARECAAYFAl3Ej4wACgkQakRjwEAQIjPBGgCbBvQSowDI1fl2+9FnjAuXifIV\nqp4AoIBHeQ0arALUOqrVAfv+sZvRsiwu\n=/1NF\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-4186-3\nNovember 13, 2019\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. It was discovered\nthat the kernel fix for CVE-2019-0155 (i915 missing Blitter Command\nStreamer check) was incomplete on 64-bit Intel x86 systems. This\nupdate addresses the issue. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Stephan van Schaik, Alyssa Milburn, Sebastian \\xd6sterlund, Pietro Frigo,\n Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz\n Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel\n processors using Transactional Synchronization Extensions (TSX) could\n expose memory contents previously stored in microarchitectural buffers to a\n malicious process that is executing on the same CPU core. A local attacker\n could use this to expose sensitive information. (CVE-2019-11135)\n\n It was discovered that the Intel i915 graphics chipsets allowed userspace\n to modify page table entries via writes to MMIO from the Blitter Command\n Streamer and expose kernel memory information. A local attacker could use\n this to expose sensitive information or possibly elevate privileges. \n (CVE-2019-0155)\n\n Deepak Gupta discovered that on certain Intel processors, the Linux kernel\n did not properly perform invalidation on page table updates by virtual\n guest operating systems. A local attacker in a guest VM could use this to\n cause a denial of service (host system crash). (CVE-2018-12207)\n\n It was discovered that the Intel i915 graphics chipsets could cause a\n system hang when userspace performed a read from GT memory mapped input\n output (MMIO) when the product is in certain low power states. A local\n attacker could use this to cause a denial of service. (CVE-2019-0154)\n\n Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver for the\n Linux kernel did not properly validate endpoint descriptors returned by the\n device. A physically proximate attacker could use this to cause a denial of\n service (system crash). (CVE-2019-15098)\n\n It was discovered that a buffer overflow existed in the 802.11 Wi-Fi\n configuration interface for the Linux kernel when handling beacon settings. \n A local attacker could use this to cause a denial of service (system crash)\n or possibly execute arbitrary code. (CVE-2019-16746)\n\n Ori Nimron discovered that the AX25 network protocol implementation in the\n Linux kernel did not properly perform permissions checks. A local attacker\n could use this to create a raw socket. (CVE-2019-17052)\n\n Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network\n protocol implementation in the Linux kernel did not properly perform\n permissions checks. A local attacker could use this to create a raw socket. \n (CVE-2019-17053)\n\n Ori Nimron discovered that the Appletalk network protocol implementation in\n the Linux kernel did not properly perform permissions checks. A local\n attacker could use this to create a raw socket. (CVE-2019-17054)\n\n Ori Nimron discovered that the modular ISDN network protocol implementation\n in the Linux kernel did not properly perform permissions checks. A local\n attacker could use this to create a raw socket. (CVE-2019-17055)\n\n Ori Nimron discovered that the Near field Communication (NFC) network\n protocol implementation in the Linux kernel did not properly perform\n permissions checks. A local attacker could use this to create a raw socket. \n (CVE-2019-17056)\n\n Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi\n driver for the Linux kernel when handling Notice of Absence frames. A\n physically proximate attacker could use this to cause a denial of service\n (system crash) or possibly execute arbitrary code. (CVE-2019-17666)\n\n Maddie Stone discovered that the Binder IPC Driver implementation in the\n Linux kernel contained a use-after-free vulnerability. A local attacker\n could use this to cause a denial of service (system crash) or possibly\n execute arbitrary code. (CVE-2019-2215)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n  linux-image-4.4.0-169-generic   4.4.0-169.198\n  linux-image-4.4.0-169-generic-lpae  4.4.0-169.198\n  linux-image-4.4.0-169-lowlatency  4.4.0-169.198\n  linux-image-generic             4.4.0.169.177\n  linux-image-generic-lpae        4.4.0.169.177\n  linux-image-lowlatency          4.4.0.169.177\n  linux-image-virtual             4.4.0.169.177\n\nPlease note that mitigating the TSX (CVE-2019-11135) and i915\n(CVE-2019-0154) issues requires corresponding microcode and graphics\nfirmware updates respectively. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n  https://usn.ubuntu.com/4186-3\n  https://usn.ubuntu.com/4186-1\n  CVE-2019-0155, https://bugs.launchpad.net/bugs/1852141\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/linux/4.4.0-169.198\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "PACKETSTORM",
        "id": "155212"
      },
      {
        "db": "PACKETSTORM",
        "id": "155335"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=47463",
        "trust": 0.2,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2215",
        "trust": 2.8
      },
      {
        "db": "PACKETSTORM",
        "id": "154911",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156495",
        "trust": 1.7
      },
      {
        "db": "PACKETSTORM",
        "id": "155212",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672",
        "trust": 0.8
      },
      {
        "db": "EXPLOIT-DB",
        "id": "47463",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "155309",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "155335",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "154730",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "48129",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4271",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0200",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0766",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2215",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "PACKETSTORM",
        "id": "155212"
      },
      {
        "db": "PACKETSTORM",
        "id": "155335"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "id": "VAR-201910-0902",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4434879933333333
  },
  "last_update_date": "2025-11-18T12:23:03.833000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android Security Bulletin-October 2019",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/2019-10-01"
      },
      {
        "title": "Android Remediation of resource management error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113604"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4186-1"
      },
      {
        "title": "Huawei Security Advisories: Security Advisory - Use-after-free Vulnerability in Android Kernel",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=1133478f2f2ad2f8395bfcd7f09871d7"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4186-3"
      },
      {
        "title": "cve-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/kangtastic/cve-2019-2215 "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/timwr/CVE-2019-2215 "
      },
      {
        "title": "qu1ckr00t",
        "trust": 0.1,
        "url": "https://github.com/grant-h/qu1ckr00t "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/soryecker/CVE-2019-2215 "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/marcinguy/CVE-2019-2215 "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/mufidmb38/CVE-2019-2215 "
      },
      {
        "title": "Umass-CS-590J-Capstone-Project",
        "trust": 0.1,
        "url": "https://github.com/aguerriero1998/Umass-CS-590J-Capstone-Project "
      },
      {
        "title": "AndroidKernelVulnerability",
        "trust": 0.1,
        "url": "https://github.com/sharif-dev/AndroidKernelVulnerability "
      },
      {
        "title": "cve-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/DimitriFourny/cve-2019-2215 "
      },
      {
        "title": "android-kernel-exploitation-ashfaq-CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/c0n71nu3/android-kernel-exploitation-ashfaq-CVE-2019-2215 "
      },
      {
        "title": "awesome-netsec-articles",
        "trust": 0.1,
        "url": "https://github.com/pengusec/awesome-netsec-articles "
      },
      {
        "title": "panopticon-Sidewinder",
        "trust": 0.1,
        "url": "https://github.com/Panopticon-Project/panopticon-Sidewinder "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/c3r34lk1ll3r/CVE-2019-2215 "
      },
      {
        "title": "android_device_sharp_sh8996",
        "trust": 0.1,
        "url": "https://github.com/saga0324/android_device_sharp_sh8996 "
      },
      {
        "title": "CVE-2019-2215",
        "trust": 0.1,
        "url": "https://github.com/addhaloka/CVE-2019-2215 "
      },
      {
        "title": "Vulnerability-engine",
        "trust": 0.1,
        "url": "https://github.com/tdcoming/Vulnerability-engine "
      },
      {
        "title": "poc-exp",
        "trust": 0.1,
        "url": "https://github.com/msr00t/poc-exp "
      },
      {
        "title": "poc--exp",
        "trust": 0.1,
        "url": "https://github.com/HacTF/poc--exp "
      },
      {
        "title": "linux-kernel-exploitation",
        "trust": 0.1,
        "url": "https://github.com/vahalen/linux-kernel-exploitation "
      },
      {
        "title": "linux-kernel-exploitation",
        "trust": 0.1,
        "url": "https://github.com/TamilHackz/linux-kernel-exploitation "
      },
      {
        "title": "android-security",
        "trust": 0.1,
        "url": "https://github.com/alphaSeclab/android-security "
      },
      {
        "title": "sec-daily-2019",
        "trust": 0.1,
        "url": "https://github.com/alphaSeclab/sec-daily-2019 "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/developer3000S/PoC-in-GitHub "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/hectorgie/PoC-in-GitHub "
      },
      {
        "title": "CVE-POC",
        "trust": 0.1,
        "url": "https://github.com/0xT11/CVE-POC "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/nomi-sec/PoC-in-GitHub "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/android-bugs-exploited-wild/166347/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/sidewinder-apt-nepal-afghanistan-spy-campaign/162086/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/brisk-private-trade-zero-days/154502/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2020/01/07/nasty_google_play_apps/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2019/11/23/security_roundup_nov22/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/google-october-android-security-update/148964/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/google-warns-of-zero-day/148924/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4186-1/"
      },
      {
        "trust": 1.7,
        "url": "https://source.android.com/security/bulletin/2019-10-01"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2019/oct/38"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/154911/android-binder-use-after-free.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/156495/android-binder-use-after-free.html"
      },
      {
        "trust": 1.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2215"
      },
      {
        "trust": 1.1,
        "url": "https://security.netapp.com/advisory/ntap-20191031-0005/"
      },
      {
        "trust": 1.1,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en"
      },
      {
        "trust": 1.1,
        "url": "https://seclists.org/bugtraq/2019/nov/11"
      },
      {
        "trust": 1.1,
        "url": "http://packetstormsecurity.com/files/155212/slackware-security-advisory-slackware-14.2-kernel-updates.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
      },
      {
        "trust": 1.0,
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2019-2215"
      },
      {
        "trust": 0.9,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2215"
      },
      {
        "trust": 0.7,
        "url": "https://www.exploit-db.com/exploits/47463"
      },
      {
        "trust": 0.7,
        "url": "https://usn.ubuntu.com/4186-3/"
      },
      {
        "trust": 0.6,
        "url": "https://usn.ubuntu.com/4186-2/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-october-2019-30549"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0766/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/155309/ubuntu-security-notice-usn-4186-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4271/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0200/"
      },
      {
        "trust": 0.6,
        "url": "https://mp.weixin.qq.com/s/kjw0wkuh7gg6k5ago_6poq"
      },
      {
        "trust": 0.6,
        "url": "https://www.exploit-db.com/exploits/48129"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191030-01-binder-cn"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/155335/ubuntu-security-notice-usn-4186-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/154730/android-binder-driver-use-after-free.html"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17053"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16746"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17054"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17055"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15098"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17056"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17052"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0154"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0155"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12207"
      },
      {
        "trust": 0.2,
        "url": "https://usn.ubuntu.com/4186-1"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11135"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17666"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/416.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/kangtastic/cve-2019-2215"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110334"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1062.69"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/taa_mcepsc_i915"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-168.197"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1098.109"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14835"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17054"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17075"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15118"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17053"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10906"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10906"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20976"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17052"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15117"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17133"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15505"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15098"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14835"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16746"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15118"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10905"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10905"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3900"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15117"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17056"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14821"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10638"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17075"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17055"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20976"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14814"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17133"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15505"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14814"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.launchpad.net/bugs/1852141"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-169.198"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4186-3"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "PACKETSTORM",
        "id": "155212"
      },
      {
        "db": "PACKETSTORM",
        "id": "155335"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "PACKETSTORM",
        "id": "155212"
      },
      {
        "db": "PACKETSTORM",
        "id": "155335"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "date": "2019-11-13T17:16:22",
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "date": "2019-11-08T15:37:19",
        "db": "PACKETSTORM",
        "id": "155212"
      },
      {
        "date": "2019-11-14T15:56:10",
        "db": "PACKETSTORM",
        "id": "155335"
      },
      {
        "date": "2019-10-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "date": "2019-10-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "date": "2019-10-11T19:15:10.947000",
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-2215"
      },
      {
        "date": "2020-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      },
      {
        "date": "2019-10-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      },
      {
        "date": "2025-10-24T14:11:31.703000",
        "db": "NVD",
        "id": "CVE-2019-2215"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "155309"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Android Uses freed memory vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010672"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201910-198"
      }
    ],
    "trust": 0.6
  }
}

VAR-202004-0619

Vulnerability from variot - Updated: 2024-11-23 22:41

There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.

A denial of service vulnerability exists in versions before Huawei Honor10 Lite Harry-AL00C 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8)

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0619",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c461e2r2p1\\)"
      },
      {
        "model": "sydneym-l03",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.217\\(c605e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.259\\(c185e1r1p2t8\\)"
      },
      {
        "model": "nova lite 3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.305\\(c635e8r2p2\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.321\\(c636e4r1p14t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e8r1p11t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "alp-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.300\\(c432e4r1p9t8\\)"
      },
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c636e2r2p1\\)"
      },
      {
        "model": "p20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c185e1r1p9t8\\)"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e10r1p12t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c636e2r1p12t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c461e3r1p11t8\\)"
      },
      {
        "model": "jackman-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.247\\(c636e2r4p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c636e7r1p13t8\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.221\\(c461e1r1p1t8\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c636e3r2p1\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.330\\(c432e6r1p12t8\\)"
      },
      {
        "model": "mate 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.131\\(c00e131r3p1\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "cornell-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "sydneym-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.228\\(c00e78r1p7t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e3r1p14t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c185e3r1p12t8\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c432e3r1p12\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c185e4r1p11t8\\)"
      },
      {
        "model": "mate 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c185e10r2p1\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c782e2r1p1t8\\)"
      },
      {
        "model": "honor view 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.238\\(c432e1r3p1\\)"
      },
      {
        "model": "paris-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c636e1r1p3t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c432e7r1p11t8\\)"
      },
      {
        "model": "p30 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.186\\(c00e180r2p1\\)"
      },
      {
        "model": "sydneym-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.226\\(c605e2r1p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c605e2r1p12t8\\)"
      },
      {
        "model": "paris-l21b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c432e1r1p2t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.302\\(c635e4r1p13t8\\)"
      },
      {
        "model": "paris-l21meb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c185e4r1p3t8\\)"
      },
      {
        "model": "mate 20 x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.135\\(c00e133r2p1\\)"
      },
      {
        "model": "honor 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.152\\(c00e150r5p1\\)"
      },
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c432e2r3p2\\)"
      },
      {
        "model": "sydney-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.258\\(c636e1r1p1t8\\)"
      },
      {
        "model": "sydney-l22br",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.258\\(c636e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c432e4r1p1t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.330\\(c461e1r1p9t8\\)"
      },
      {
        "model": "columbia-al10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.336\\(c605e3r1p12t8\\)"
      },
      {
        "model": "y9 2019",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.220\\(c605e3r1p1t8\\)"
      },
      {
        "model": "sydney-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p1t8\\)"
      },
      {
        "model": "alp-l29",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.315\\(c636e5r1p13t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.335\\(c636e3r1p13t8\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.270\\(c432e3r1p1t8\\)"
      },
      {
        "model": "p30",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.193"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c432e1r1p9t8\\)"
      },
      {
        "model": "honor 8x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.221\\(c461e2r1p1t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.220\\(c635e1r1p2t8\\)"
      },
      {
        "model": "berkeley-al20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c636e4r1p13t8\\)"
      },
      {
        "model": "honor v20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.234\\(c00e234r4p3\\)"
      },
      {
        "model": "sydney-l21br",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p2t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.216\\(c569e1r1p1t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e5r1p14t8\\)"
      },
      {
        "model": "mate 20 rs",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.135\\(c786e133r3p1\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e3r3p1\\)"
      },
      {
        "model": "sydney-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.212\\(c00e62r1p7t8\\)"
      },
      {
        "model": "charlotte-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e4r1p11t8\\)"
      },
      {
        "model": "p20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "sydney-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c432e1r1p1t8\\)"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e2r1p12t8\\)"
      },
      {
        "model": "charlotte-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e8r1p11t8\\)"
      },
      {
        "model": "honor magic2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.187"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.336\\(c605e4r1p12t8\\)"
      },
      {
        "model": "honor 10 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.283\\(c605e8r2p2\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "9.1.0.350(c10e3r1p14t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "9.1.0.350(c636e4r1p13t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "9.1.0.302(c635e4r1p13t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "9.1.0.321(c636e4r1p14t8)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.333(c00e333r2p1t8)"
      },
      {
        "model": "alp-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.300(c432e4r1p9t8)"
      },
      {
        "model": "alp-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.315(c636e5r1p13t8)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.333(c00e333r2p1t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.351(c432e5r1p13t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.330(c432e6r1p12t8)"
      },
      {
        "model": "honor10 lite \u003charry-al00c 9.1.0.217",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "y9 \u003cjackman-l23 9.1.0.220",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.1.18d(c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.106(c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.113(sp2c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.113(sp3c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.113(sp7c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.118(c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.120(sp2c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.125(sp1c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.125(sp3c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.126(sp2c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.126(sp5c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.127(sp1c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.128(sp2c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.129"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.129(sp2c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.153(c00)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.336(c00)"
      },
      {
        "model": "alp-l09",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.105(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.111(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.112d(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.116(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.119(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.119d(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.122(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.132(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.132d(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.142(c00)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.151(c00)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.127(c432)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.0.0.137(c432)"
      },
      {
        "model": "charlotte-l09c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c185e4r1p11t8)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.325(c185e4r1p11t8)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.335(c636e3r1p13t8)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.336(c605e3r1p12t8)"
      },
      {
        "model": "columbia-al10b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.163(c00)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.146(c461)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.148(c185)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.151(c10)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.151(c432)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.350(c10e5r1p14t8)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.350(c185e3r1p12t8)"
      },
      {
        "model": "columbia-l29d",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.350(c461e3r1p11t8)"
      },
      {
        "model": "cornell-l29a",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.328(c185e1r1p9t8)"
      },
      {
        "model": "cornell-l29a",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.328(c432e1r1p9t8)"
      },
      {
        "model": "cornell-l29a",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.328(c636e2r1p12t8)"
      },
      {
        "model": "emily-l09c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "emily-l09c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c185e2r1p12t8)"
      },
      {
        "model": "emily-l09c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.336(c605e4r1p12t8)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.132a(c432)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.135(c782)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.154(c10)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.154(c461)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.154(c635)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.156(c185)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.156(c605)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.159(c636)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c10e2r1p13t8)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c185e2r1p12t8)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c432e7r1p11t8)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c461e2r1p11t8)"
      },
      {
        "model": "emily-l29c",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.311(c605e2r1p12t8)"
      },
      {
        "model": "ever-l29b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.0.0.206(c185e3r3p1)"
      },
      {
        "model": "ever-l29b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.0.0.207(c636e3r2p1)"
      },
      {
        "model": "ever-l29b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.0.0.208(c432e3r1p12)"
      },
      {
        "model": "ever-l29b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.310(c432e3r1p12)"
      },
      {
        "model": "ever-l29b",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.310(c636e3r2p1)"
      },
      {
        "model": "honor 10 lite",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor 10 lite",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.217(c00e215r3p1)"
      },
      {
        "model": "honor 8x",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor 8x",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.217(c00e15r3p2t8)"
      },
      {
        "model": "honor magic2",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor magic2",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "10.0.0.175(c00e59r2p11)"
      },
      {
        "model": "honor v20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor v20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.0.1.161(c00e161r2p2)"
      },
      {
        "model": "jackman-l22",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.2.0.156(c636r2p2)"
      },
      {
        "model": "mate 20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mate 20 pro",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "mate 20 pro",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.135(c00e133r3p1)"
      },
      {
        "model": "mate 20 rs",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.109"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.120"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.121"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.128"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.130"
      },
      {
        "model": "p20",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.1.0.171(c00)"
      },
      {
        "model": "p20 pro",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p30",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p30 pro",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sydney-l21",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.213(c185e1r1p1t8)"
      },
      {
        "model": "sydneym-l01",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.213(c185e1r1p1t8)"
      },
      {
        "model": "sydneym-l01",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.215(c782e2r1p1t8)"
      },
      {
        "model": "sydneym-l21",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.215(c432e4r1p1t8)"
      },
      {
        "model": "sydneym-l22",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.216(c569e1r1p1t8)"
      },
      {
        "model": "sydneym-l22",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.220(c635e1r1p2t8)"
      },
      {
        "model": "y9 2019",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "y9 2019",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.2.0.160(c185r2p2)"
      },
      {
        "model": "y9 2019",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.2.0.162(c605)"
      },
      {
        "model": "y9 2019",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "8.2.0.163(c605)"
      },
      {
        "model": "yale-l21a",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.154(c432e2r3p2)"
      },
      {
        "model": "yale-l21a",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "9.1.0.154(c461e2r2p1)"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:alp-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berkeley-al20_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berkeley-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l29c_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "These two vulnerabilities were discovered by Huawei internal testing.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-5303",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2019-5303",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 2.9,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015526",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.2,
            "id": "CNVD-2019-44785",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2019-5303",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015526",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-5303",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015526",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-44785",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201908-1092",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-5303",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China\u0027s Huawei. \n\nA denial of service vulnerability exists in versions before Huawei Honor10 Lite Harry-AL00C 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-5303",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "id": "VAR-202004-0619",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      }
    ],
    "trust": 1.1828954514285712
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:41:07.750000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20190814-01-mobile",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
      },
      {
        "title": "Patch for Huawei Honor10 Lite and Huawei Y9 Denial of Service Vulnerability (CNVD-2019-44785)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/193773"
      },
      {
        "title": "Huawei Honor10 Lite  and Huawei Y9 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96758"
      },
      {
        "title": "Huawei Security Advisories: Two Denial of Service Vulnerabilities on Some Huawei Smartphones",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=88453f1b990572fac17211a1a9b849ea"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5303"
      },
      {
        "trust": 1.2,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190814-01-mobile-cn"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5303"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/165364"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "date": "2020-04-27T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "date": "2020-06-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "date": "2020-04-27T20:15:12.397000",
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-44785"
      },
      {
        "date": "2020-05-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-5303"
      },
      {
        "date": "2020-06-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      },
      {
        "date": "2020-09-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      },
      {
        "date": "2024-11-21T04:44:42.557000",
        "db": "NVD",
        "id": "CVE-2019-5303"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Input verification vulnerabilities on smartphones",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015526"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1092"
      }
    ],
    "trust": 0.6
  }
}

VAR-201811-0557

Vulnerability from variot - Updated: 2024-11-23 22:34

Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone. plural Huawei Smartphones have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ALP-AL00B\BLA-AL00B is a smartphone launched by Huawei

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201811-0557",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "bla-al00b",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.1.18d\\(c00\\)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.127\\(c432\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.1.18d\\(c00\\)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.137\\(c432\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.127\\(c432\\)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.128\\(c432\\)"
      },
      {
        "model": "alp-tl00b",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.1.18d\\(c01\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "8.0.0.137\\(c432\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.118d(c00)"
      },
      {
        "model": "alp-tl00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.118d(c01)"
      },
      {
        "model": "bla-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.118d(c00)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.127(c432)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.128(c432)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.137(c432)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.129(c432)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.137(c432)"
      },
      {
        "model": "alp-al00b 8.0.0.118d",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "alp-tl00b 8.0.0.118d",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-al00b 8.0.0.118d",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l09c 8.0.0.127",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l09c 8.0.0.128",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l09c 8.0.0.137",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l29c 8.0.0.129",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "bla-l29c 8.0.0.137",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:alp-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-tl00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l09c_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l29c_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      }
    ]
  },
  "cve": "CVE-2018-7910",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7910",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2018-22641",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137942",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.9,
            "id": "CVE-2018-7910",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7910",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7910",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-22641",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201811-018",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137942",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user\u0027s smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone. plural Huawei Smartphones have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ALP-AL00B\\\\BLA-AL00B is a smartphone launched by Huawei",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7910",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "id": "VAR-201811-0557",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      }
    ],
    "trust": 1.221733824
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:34:05.242000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20181101-01-bypass",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en"
      },
      {
        "title": "A variety of Huawei mobile phone authentication bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/143925"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86564"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.2,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20181101-01-bypass-cn"
      },
      {
        "trust": 1.1,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7910"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7910"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-11-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "date": "2018-11-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "date": "2018-11-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "date": "2018-11-13T19:29:00.400000",
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-11-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-22641"
      },
      {
        "date": "2018-12-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137942"
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      },
      {
        "date": "2018-11-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      },
      {
        "date": "2024-11-21T04:12:57.327000",
        "db": "NVD",
        "id": "CVE-2018-7910"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Authentication vulnerabilities in smartphones",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011719"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-018"
      }
    ],
    "trust": 0.6
  }
}

VAR-202004-0618

Vulnerability from variot - Updated: 2024-11-23 22:21

There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.

A denial of service vulnerability exists in Huawei Honor10 Lite Harry-AL00C versions earlier than 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8). The vulnerability stems from the fact that the two fields are not duplicated when parsing

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0618",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c461e2r2p1\\)"
      },
      {
        "model": "sydneym-l03",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.217\\(c605e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.259\\(c185e1r1p2t8\\)"
      },
      {
        "model": "nova lite 3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.305\\(c635e8r2p2\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.321\\(c636e4r1p14t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e8r1p11t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "alp-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.300\\(c432e4r1p9t8\\)"
      },
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c636e2r2p1\\)"
      },
      {
        "model": "p20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c185e1r1p9t8\\)"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e10r1p12t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c636e2r1p12t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c461e3r1p11t8\\)"
      },
      {
        "model": "jackman-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.247\\(c636e2r4p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c636e7r1p13t8\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.221\\(c461e1r1p1t8\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c636e3r2p1\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.330\\(c432e6r1p12t8\\)"
      },
      {
        "model": "mate 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.131\\(c00e131r3p1\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.351\\(c432e5r1p13t8\\)"
      },
      {
        "model": "cornell-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "sydneym-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.228\\(c00e78r1p7t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e3r1p14t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c185e3r1p12t8\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c432e3r1p12\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.325\\(c185e4r1p11t8\\)"
      },
      {
        "model": "mate 20 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.310\\(c185e10r2p1\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c782e2r1p1t8\\)"
      },
      {
        "model": "honor view 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.238\\(c432e1r3p1\\)"
      },
      {
        "model": "paris-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c636e1r1p3t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c432e7r1p11t8\\)"
      },
      {
        "model": "p30 pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.186\\(c00e180r2p1\\)"
      },
      {
        "model": "sydneym-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.226\\(c605e2r1p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c605e2r1p12t8\\)"
      },
      {
        "model": "paris-l21b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c432e1r1p2t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.302\\(c635e4r1p13t8\\)"
      },
      {
        "model": "paris-l21meb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c185e4r1p3t8\\)"
      },
      {
        "model": "mate 20 x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.135\\(c00e133r2p1\\)"
      },
      {
        "model": "honor 20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.152\\(c00e150r5p1\\)"
      },
      {
        "model": "yale-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.154\\(c432e2r3p2\\)"
      },
      {
        "model": "sydney-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.258\\(c636e1r1p1t8\\)"
      },
      {
        "model": "sydney-l22br",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.258\\(c636e1r1p1t8\\)"
      },
      {
        "model": "sydneym-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c432e4r1p1t8\\)"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.330\\(c461e1r1p9t8\\)"
      },
      {
        "model": "columbia-al10b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.336\\(c605e3r1p12t8\\)"
      },
      {
        "model": "y9 2019",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.220\\(c605e3r1p1t8\\)"
      },
      {
        "model": "sydney-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p1t8\\)"
      },
      {
        "model": "alp-l29",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.315\\(c636e5r1p13t8\\)"
      },
      {
        "model": "charlotte-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.335\\(c636e3r1p13t8\\)"
      },
      {
        "model": "sydneym-l01",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.270\\(c432e3r1p1t8\\)"
      },
      {
        "model": "p30",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.193"
      },
      {
        "model": "cornell-l29a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.328\\(c432e1r1p9t8\\)"
      },
      {
        "model": "honor 8x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.221\\(c461e2r1p1t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.220\\(c635e1r1p2t8\\)"
      },
      {
        "model": "berkeley-al20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r2p1t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c636e4r1p13t8\\)"
      },
      {
        "model": "honor v20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.234\\(c00e234r4p3\\)"
      },
      {
        "model": "sydney-l21br",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.213\\(c185e1r1p2t8\\)"
      },
      {
        "model": "sydneym-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.216\\(c569e1r1p1t8\\)"
      },
      {
        "model": "columbia-l29d",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.350\\(c10e5r1p14t8\\)"
      },
      {
        "model": "mate 20 rs",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.135\\(c786e133r3p1\\)"
      },
      {
        "model": "ever-l29b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e3r3p1\\)"
      },
      {
        "model": "sydney-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.212\\(c00e62r1p7t8\\)"
      },
      {
        "model": "charlotte-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e4r1p11t8\\)"
      },
      {
        "model": "p20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.333\\(c00e333r1p1t8\\)"
      },
      {
        "model": "sydney-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.215\\(c432e1r1p1t8\\)"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.311\\(c185e2r1p12t8\\)"
      },
      {
        "model": "charlotte-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.345\\(c432e8r1p11t8\\)"
      },
      {
        "model": "honor magic2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.187"
      },
      {
        "model": "emily-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.336\\(c605e4r1p12t8\\)"
      },
      {
        "model": "honor 10 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.283\\(c605e8r2p2\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.333(c00e333r2p1t8)"
      },
      {
        "model": "alp-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.300(c432e4r1p9t8)"
      },
      {
        "model": "alp-l29",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.315(c636e5r1p13t8)"
      },
      {
        "model": "berkeley-al20",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.333(c00e333r2p1t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.350(c10e3r1p14t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.350(c636e4r1p13t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.351(c432e5r1p13t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.302(c635e4r1p13t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.321(c636e4r1p14t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.330(c432e6r1p12t8)"
      },
      {
        "model": "honor10 lite \u003charry-al00c 9.1.0.217",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "y9 \u003cjackman-l23 9.1.0.220",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:alp-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-l29_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berkeley-al20_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:berkeley-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l29c_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "These two vulnerabilities were discovered by Huawei internal testing.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-5302",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2019-5302",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 2.9,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015525",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-33609",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.6,
            "id": "CVE-2019-5302",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015525",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-5302",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015525",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-33609",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201908-1095",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-5302",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China\u0027s Huawei. \n\nA denial of service vulnerability exists in Huawei Honor10 Lite Harry-AL00C versions earlier than 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8). The vulnerability stems from the fact that the two fields are not duplicated when parsing ",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-5302",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "id": "VAR-202004-0618",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      }
    ],
    "trust": 1.1828954514285714
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:13.412000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20190814-01-mobile",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
      },
      {
        "title": "Patch for Huawei Honor10 Lite and Huawei Y9 Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/182801"
      },
      {
        "title": "Huawei Honor10 Lite  and Huawei Y9 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96759"
      },
      {
        "title": "Huawei Security Advisories: Two Denial of Service Vulnerabilities on Some Huawei Smartphones",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=88453f1b990572fac17211a1a9b849ea"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5302"
      },
      {
        "trust": 1.2,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190814-01-mobile-cn"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5302"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "date": "2020-04-27T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "date": "2020-06-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "date": "2020-04-27T20:15:12.337000",
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-33609"
      },
      {
        "date": "2020-05-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-5302"
      },
      {
        "date": "2020-06-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      },
      {
        "date": "2020-09-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      },
      {
        "date": "2024-11-21T04:44:42.343000",
        "db": "NVD",
        "id": "CVE-2019-5302"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Input verification vulnerabilities on smartphones",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015525"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-1095"
      }
    ],
    "trust": 0.6
  }
}

VAR-202006-0752

Vulnerability from variot - Updated: 2024-11-23 22:11

Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en. plural Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0752",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "leland-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.135\\(c185\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.159\\(c185e2r1p12t8\\)"
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.131\\(c432\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.160\\(c605\\)"
      },
      {
        "model": "figo-l03",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c605e6r1p5t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.148\\(c635\\)"
      },
      {
        "model": "bla-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.181\\(c00e88r2p15t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.155\\(c605\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.168\\(c432\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.160\\(c605\\)"
      },
      {
        "model": "florida-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.144\\(c605\\)"
      },
      {
        "model": "y7s",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.124\\(c636e6r1p5t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.165\\(c605e2r1p12\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.157\\(c432\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.172\\(c636\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.168\\(c432\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.147\\(c461\\)"
      },
      {
        "model": "alp-l29",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.177\\(c185e2r1p12t8\\)"
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.132\\(c185\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.160\\(c185\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.168\\(c636e7r1p13t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.172\\(c636\\)"
      },
      {
        "model": "alp-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.201\\(c432e4r1p9\\)"
      },
      {
        "model": "alp-l29",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.195\\(c636e2r1p12\\)"
      },
      {
        "model": "figo-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c635e6r1p5t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.172\\(c432\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.156\\(c605\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.147\\(c461\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.155\\(c185\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.160\\(c185\\)"
      },
      {
        "model": "leland-l22c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.118\\(c636e4r1p1t8\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.181\\(c00e87r2p20t8\\)"
      },
      {
        "model": "florida-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.129\\(c605\\)"
      },
      {
        "model": "figo-l31",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c432e8r1p5t8\\)"
      },
      {
        "model": "berkeley-al20",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.156\\(c00e156r2p14t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.206\\(c432e4r1p11\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.210\\(c635e4r1p13\\)"
      },
      {
        "model": "leland-al00a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.182\\(c00\\)"
      },
      {
        "model": "anne-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.168\\(c00\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.168\\(c782e3r1p11t8\\)"
      },
      {
        "model": "p smart",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c605e6r1p5t8\\)"
      },
      {
        "model": "leland-l22a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.118\\(c636e4r1p1t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.179\\(c576e2r1p7t8\\)"
      },
      {
        "model": "nova 3e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.148\\(zafc185\\)"
      },
      {
        "model": "bla-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.206\\(c432e4r1p11\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.159\\(c461e2r1p11t8\\)"
      },
      {
        "model": "florida-l03",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.121\\(c605e5r1p1t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.196\\(c635e2r1p11t8\\)"
      },
      {
        "model": "figo-l23",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c605e6r1p5t8\\)"
      },
      {
        "model": "florida-l22",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.132\\(c636\\)"
      },
      {
        "model": "bla-l09c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.177\\(c185e2r1p13t8\\)"
      },
      {
        "model": "bla-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.194\\(c185e2r1p13\\)"
      },
      {
        "model": "p smart",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c185e6r1p5t8\\)"
      },
      {
        "model": "emily-l29c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.160\\(c432e7r1p11t8\\)"
      },
      {
        "model": "p20 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.148\\(zafc185\\)"
      },
      {
        "model": "honor view 10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.202\\(c567e6r1p12t8\\)"
      },
      {
        "model": "leland-l31a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.139\\(c432\\)"
      },
      {
        "model": "leland-l21a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.118\\(c636e4r1p1t8\\)"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0.173\\(c636\\)"
      },
      {
        "model": "figo-l21",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.130\\(c185e6r1p5t8\\)"
      },
      {
        "model": "p smart",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.124\\(c636e6r1p5t8\\)"
      },
      {
        "model": "alp-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.181(c00e87r2p20t8)"
      },
      {
        "model": "alp-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.201(c432e4r1p9)"
      },
      {
        "model": "alp-l29",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.177(c185e2r1p12t8)"
      },
      {
        "model": "alp-l29",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.195(c636e2r1p12)"
      },
      {
        "model": "anne-al00",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "8.0.0.168(c00)"
      },
      {
        "model": "bla-al00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.181(c00e88r2p15t8)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.177(c185e2r1p13t8)"
      },
      {
        "model": "bla-l09c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.206(c432e4r1p11)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.179(c576e2r1p7t8)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.194(c185e2r1p13)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.206(c432e4r1p11)"
      },
      {
        "model": "bla-l29c",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.210(c635e4r1p13)"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:alp-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-l09_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:alp-l29_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:anne-al00_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-al00b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l09c_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:bla-l29c_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vulnerability was discovered by Huawei internal testing.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-19412",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-19412",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 2.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015648",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 0.9,
            "id": "CVE-2019-19412",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Physical",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015648",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-19412",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015648",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202001-783",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en. plural Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-19412",
        "trust": 2.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "id": "VAR-202006-0752",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4998869988888889
  },
  "last_update_date": "2024-11-23T22:11:28.102000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200115-01-frp",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=107111"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19412"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19412"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-frp-cn"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "date": "2020-01-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "date": "2020-06-08T19:15:10.517000",
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      },
      {
        "date": "2021-01-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      },
      {
        "date": "2024-11-21T04:34:43.503000",
        "db": "NVD",
        "id": "CVE-2019-19412"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Vulnerabilities in smartphones",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015648"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202001-783"
      }
    ],
    "trust": 0.6
  }
}

CVE-2019-19412 (GCVE-0-2019-19412)

Vulnerability from nvd – Published: 2020-06-08 18:21 – Updated: 2024-08-05 02:16
VLAI?
Summary
Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en.
Severity ?
No CVSS data available.
CWE
  • FRP Bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: earlier than 9.0.0.181(C00E87R2P20T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: earlier than 9.0.0.201(C432E4R1P9)
Create a notification for this product.
    Huawei ALP-L29 Affected: earlier than 9.0.0.177(C185E2R1P12T8)
Affected: earlier than 9.0.0.195(C636E2R1P12)
Create a notification for this product.
    Huawei Anne-AL00 Affected: earlier than 8.0.0.168(C00)
Create a notification for this product.
    Huawei BLA-AL00B Affected: earlier than 9.0.0.181(C00E88R2P15T8)
Create a notification for this product.
    Huawei BLA-L09C Affected: earlier than 9.0.0.177(C185E2R1P13T8)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Create a notification for this product.
    Huawei BLA-L29C Affected: earlier than 9.0.0.179(C576E2R1P7T8)
Affected: earlier than 9.0.0.194(C185E2R1P13)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Affected: earlier than 9.0.0.210(C635E4R1P13)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: earlier than 9.0.0.156(C00E156R2P14T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: earlier than 8.0.0.172(C432)
Affected: earlier than 8.0.0.173(C636)
Create a notification for this product.
    Huawei Emily-L29C Affected: earlier than 9.0.0.159(C185E2R1P12T8)
Affected: earlier than 9.0.0.159(C461E2R1P11T8)
Affected: earlier than 9.0.0.160(C432E7R1P11T8)
Affected: earlier than 9.0.0.165(C605E2R1P12)
Affected: earlier than 9.0.0.168(C636E7R1P13T8)
Affected: earlier than 9.0.0.168(C782E3R1P11T8)
Affected: earlier than 9.0.0.196(C635E2R1P11T8)
Create a notification for this product.
    Huawei Figo-L03 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L21 Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C635E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L23 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L31 Affected: earlier than 9.1.0.130(C432E8R1P5T8)
Create a notification for this product.
    Huawei Florida-L03 Affected: earlier than 9.1.0.121(C605E5R1P1T8)
Create a notification for this product.
    Huawei Florida-L21 Affected: earlier than 8.0.0.129(C605)
Affected: earlier than 8.0.0.131(C432)
Affected: earlier than 8.0.0.132(C185)
Create a notification for this product.
    Huawei Florida-L22 Affected: earlier than 8.0.0.132(C636)
Create a notification for this product.
    Huawei Florida-L23 Affected: earlier than 8.0.0.144(C605)
Create a notification for this product.
    Huawei HUAWEI P smart Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P smart,HUAWEI Y7s Affected: earlier than 9.1.0.124(C636E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P20 lite Affected: earlier than 8.0.0.148(C635)
Affected: earlier than 8.0.0.155(C185)
Affected: earlier than 8.0.0.155(C605)
Affected: earlier than 8.0.0.156(C605)
Affected: earlier than 8.0.0.157(C432)
Create a notification for this product.
    Huawei HUAWEI nova 3e,HUAWEI P20 lite Affected: earlier than 8.0.0.147(C461)
Affected: earlier than 8.0.0.148(ZAFC185)
Affected: earlier than 8.0.0.160(C185)
Affected: earlier than 8.0.0.160(C605)
Affected: earlier than 8.0.0.168(C432)
Affected: earlier than 8.0.0.172(C636)
Create a notification for this product.
    Huawei Honor View 10 Affected: earlier than 9.0.0.202(C567E6R1P12T8)
Create a notification for this product.
    Huawei Leland-AL00A Affected: earlier than 8.0.0.182(C00)
Create a notification for this product.
    Huawei Leland-L21A Affected: earlier than 8.0.0.135(C185)
Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22A Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22C Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L31A Affected: earlier than 8.0.0.139(C432)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E87R2P20T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.201(C432E4R1P9)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.195(C636E2R1P12)"
            }
          ]
        },
        {
          "product": "Anne-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C00)"
            }
          ]
        },
        {
          "product": "BLA-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E88R2P15T8)"
            }
          ]
        },
        {
          "product": "BLA-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.179(C576E2R1P7T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.194(C185E2R1P13)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.210(C635E4R1P13)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.156(C00E156R2P14T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.173(C636)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C461E2R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.160(C432E7R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.165(C605E2R1P12)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C782E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.196(C635E2R1P11T8)"
            }
          ]
        },
        {
          "product": "Figo-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C635E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L31",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C432E8R1P5T8)"
            }
          ]
        },
        {
          "product": "Florida-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.121(C605E5R1P1T8)"
            }
          ]
        },
        {
          "product": "Florida-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.129(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.131(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C185)"
            }
          ]
        },
        {
          "product": "Florida-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C636)"
            }
          ]
        },
        {
          "product": "Florida-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.144(C605)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart,HUAWEI Y7s",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.124(C636E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(C635)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.156(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.157(C432)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 3e,HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.147(C461)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(ZAFC185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C636)"
            }
          ]
        },
        {
          "product": "Honor View 10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.202(C567E6R1P12T8)"
            }
          ]
        },
        {
          "product": "Leland-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.182(C00)"
            }
          ]
        },
        {
          "product": "Leland-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.135(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L31A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.139(C432)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "FRP Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T15:29:39",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19412",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.201(C432E4R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.195(C636E2R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.168(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.194(C185E2R1P13)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.210(C635E4R1P13)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.172(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.173(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.165(C605E2R1P12)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Figo-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L31",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.129(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.131(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.132(C185)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.132(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.144(C605)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart,HUAWEI Y7s",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.148(C635)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.156(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.157(C432)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.147(C461)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.148(ZAFC185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.168(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.172(C636)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor View 10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.182(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.135(C185)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L31A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.139(C432)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "FRP Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19412",
    "datePublished": "2020-06-08T18:21:28",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5303 (GCVE-0-2019-5303)

Vulnerability from nvd – Published: 2020-04-27 20:01 – Updated: 2024-08-04 19:54
VLAI?
Summary
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: Versions earlier than 9.1.0.300(C432E4R1P9T8)
Create a notification for this product.
    Huawei ALP-L29 Affected: Versions earlier than 9.1.0.315(C636E5R1P13T8)
Create a notification for this product.
    Huawei BLA-L29C Affected: Versions earlier than 9.1.0.321(C636E4R1P14T8)
Affected: Versions earlier than 9.1.0.330(C432E6R1P12T8)
Affected: Versions earlier than 9.1.0.302(C635E4R1P13T8)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: Versions earlier than 9.1.0.350(C10E3R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Affected: Versions earlier than 9.1.0.350(C636E4R1P13T8)
Create a notification for this product.
    Huawei Charlotte-L09C Affected: Versions earlier than 9.1.0.311(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Create a notification for this product.
    Huawei Charlotte-L29C Affected: Versions earlier than 9.1.0.325(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.335(C636E3R1P13T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Affected: Versions earlier than 9.1.0.336(C605E3R1P12T8)
Create a notification for this product.
    Huawei Columbia-AL10B Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Columbia-L29D Affected: Versions earlier than 9.1.0.350(C461E3R1P11T8)
Affected: Versions earlier than 9.1.0.350(C185E3R1P12T8)
Affected: Versions earlier than 9.1.0.350(C10E5R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Create a notification for this product.
    Huawei Cornell-AL00A Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Cornell-L29A Affected: Versions earlier than 9.1.0.328(C185E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C432E1R1P9T8)
Affected: Versions earlier than 9.1.0.330(C461E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C636E2R1P12T8)
Create a notification for this product.
    Huawei Emily-L09C Affected: Versions earlier than 9.1.0.336(C605E4R1P12T8)
Affected: Versions earlier than 9.1.0.311(C185E2R1P12T8)
Affected: Versions earlier than 9.1.0.345(C432E10R1P12T8)
Create a notification for this product.
    Huawei Emily-L29C Affected: Versions earlier than 9.1.0.311(C605E2R1P12T8)
Affected: Versions earlier than 9.1.0.311(C636E7R1P13T8)
Affected: Versions earlier than 9.1.0.311(C432E7R1P11T8)
Create a notification for this product.
    Huawei Ever-L29B Affected: Versions earlier than 9.1.0.311(C185E3R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Affected: Versions earlier than 9.1.0.131(C00E131R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Pro Affected: Versions earlier than 9.1.0.310(C185E10R2P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 RS Affected: Versions earlier than 9.1.0.135(C786E133R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 X Affected: Versions earlier than 9.1.0.135(C00E133R2P1)
Create a notification for this product.
    Huawei HUAWEI P20 Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P20 Pro Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P30 Affected: Versions earlier than 9.1.0.193
Create a notification for this product.
    Huawei HUAWEI P30 Pro Affected: Versions earlier than 9.1.0.186(C00E180R2P1)
Create a notification for this product.
    Huawei HUAWEI Y9 2019 Affected: Versions earlier than 9.1.0.220(C605E3R1P1T8)
Create a notification for this product.
    Huawei HUAWEI nova lite 3 Affected: Versions earlier than 9.1.0.305(C635E8R2P2)
Create a notification for this product.
    Huawei Honor 10 Lite Affected: Versions earlier than 9.1.0.283(C605E8R2P2)
Create a notification for this product.
    Huawei Honor 8X Affected: Versions earlier than 9.1.0.221(C461E2R1P1T8)
Create a notification for this product.
    Huawei Honor View 20 Affected: Versions earlier than 9.1.0.238(C432E1R3P1)
Create a notification for this product.
    Huawei Jackman-L22 Affected: Versions earlier than 9.1.0.247(C636E2R4P1T8)
Create a notification for this product.
    Huawei Paris-L21B Affected: Versions earlier than 9.1.0.331(C432E1R1P2T8)
Create a notification for this product.
    Huawei Paris-L21MEB Affected: Versions earlier than 9.1.0.331(C185E4R1P3T8)
Create a notification for this product.
    Huawei Paris-L29B Affected: Versions earlier than 9.1.0.331(C636E1R1P3T8)
Create a notification for this product.
    Huawei Sydney-AL00 Affected: Versions earlier than 9.1.0.212(C00E62R1P7T8)
Create a notification for this product.
    Huawei Sydney-L21 Affected: Versions earlier than 9.1.0.215(C432E1R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L21BR Affected: Versions earlier than 9.1.0.213(C185E1R1P2T8)
Create a notification for this product.
    Huawei Sydney-L22 Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L22BR Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-AL00 Affected: Versions earlier than 9.1.0.228(C00E78R1P7T8)
Create a notification for this product.
    Huawei SydneyM-L01 Affected: Versions earlier than 9.1.0.215(C782E2R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Affected: Versions earlier than 9.1.0.270(C432E3R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L03 Affected: Versions earlier than 9.1.0.217(C605E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L21 Affected: Versions earlier than 9.1.0.221(C461E1R1P1T8)
Affected: Versions earlier than 9.1.0.215(C432E4R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L22 Affected: Versions earlier than 9.1.0.259(C185E1R1P2T8)
Affected: Versions earlier than 9.1.0.220(C635E1R1P2T8)
Affected: Versions earlier than 9.1.0.216(C569E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L23 Affected: Versions earlier than 9.1.0.226(C605E2R1P1T8)
Create a notification for this product.
    Huawei Yale-L21A Affected: Versions earlier than 9.1.0.154(C432E2R3P2)
Affected: Versions earlier than 9.1.0.154(C461E2R2P1)
Affected: Versions earlier than 9.1.0.154(C636E2R2P1)
Create a notification for this product.
    Huawei Honor 20 Affected: Versions earlier than 9.1.0.152(C00E150R5P1)
Create a notification for this product.
    Huawei Honor Magic2 Affected: Versions earlier than 10.0.0.187
Create a notification for this product.
    Huawei Honor V20 Affected: Versions earlier than 9.1.0.234(C00E234R4P3)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:53.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
            }
          ]
        },
        {
          "product": "Columbia-AL10B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Columbia-L29D",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            }
          ]
        },
        {
          "product": "Cornell-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Cornell-L29A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
            }
          ]
        },
        {
          "product": "Ever-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E3R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.131(C00E131R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.310(C185E10R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 RS",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C786E133R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C00E133R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI P20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.193"
            }
          ]
        },
        {
          "product": "HUAWEI P30 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.186(C00E180R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Y9 2019",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI nova lite 3",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.305(C635E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.283(C605E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 8X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Honor View 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.238(C432E1R3P1)"
            }
          ]
        },
        {
          "product": "Jackman-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
            }
          ]
        },
        {
          "product": "Paris-L21B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Paris-L21MEB",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
            }
          ]
        },
        {
          "product": "Paris-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
            }
          ]
        },
        {
          "product": "Sydney-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L01",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Yale-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C432E2R3P2)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C461E2R2P1)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C636E2R2P1)"
            }
          ]
        },
        {
          "product": "Honor 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.152(C00E150R5P1)"
            }
          ]
        },
        {
          "product": "Honor Magic2",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 10.0.0.187"
            }
          ]
        },
        {
          "product": "Honor V20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-27T20:01:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Charlotte-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Charlotte-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-AL10B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-L29D",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-L29A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ever-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E3R3P1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HUAWEI Mate 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.131(C00E131R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.310(C185E10R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 RS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C786E133R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C00E133R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.193"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.186(C00E180R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Y9 2019",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova lite 3",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.305(C635E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.283(C605E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 8X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor View 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.238(C432E1R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Jackman-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21MEB",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Sydney-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L21BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yale-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C432E2R3P2)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C461E2R2P1)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C636E2R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.152(C00E150R5P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor Magic2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 10.0.0.187"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor V20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.234(C00E234R4P3)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5303",
    "datePublished": "2020-04-27T20:01:02",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:53.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5302 (GCVE-0-2019-5302)

Vulnerability from nvd – Published: 2020-04-27 19:50 – Updated: 2024-08-04 19:54
VLAI?
Summary
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
References
Impacted products
Vendor Product Version
Huawei Sydney-L21 Affected: Versions earlier than 9.1.0.215(C432E1R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L21BR Affected: Versions earlier than 9.1.0.213(C185E1R1P2T8)
Create a notification for this product.
    Huawei Sydney-L22 Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L22BR Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-AL00 Affected: Versions earlier than 9.1.0.228(C00E78R1P7T8)
Create a notification for this product.
    Huawei SydneyM-L01 Affected: Versions earlier than 9.1.0.215(C782E2R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Affected: Versions earlier than 9.1.0.270(C432E3R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L03 Affected: Versions earlier than 9.1.0.217(C605E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L21 Affected: Versions earlier than 9.1.0.221(C461E1R1P1T8)
Affected: Versions earlier than 9.1.0.215(C432E4R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L22 Affected: Versions earlier than 9.1.0.259(C185E1R1P2T8)
Affected: Versions earlier than 9.1.0.220(C635E1R1P2T8)
Affected: Versions earlier than 9.1.0.216(C569E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L23 Affected: Versions earlier than 9.1.0.226(C605E2R1P1T8)
Create a notification for this product.
    Huawei Yale-L21A Affected: Versions earlier than 9.1.0.154(C432E2R3P2)
Affected: Versions earlier than 9.1.0.154(C461E2R2P1)
Affected: Versions earlier than 9.1.0.154(C636E2R2P1)
Create a notification for this product.
    Huawei Honor 20 Affected: Versions earlier than 9.1.0.152(C00E150R5P1)
Create a notification for this product.
    Huawei Honor Magic2 Affected: Versions earlier than 10.0.0.187
Create a notification for this product.
    Huawei Honor V20 Affected: Versions earlier than 9.1.0.234(C00E234R4P3)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Affected: Versions earlier than 9.1.0.131(C00E131R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Pro Affected: Versions earlier than 9.1.0.310(C185E10R2P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 RS Affected: Versions earlier than 9.1.0.135(C786E133R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 X Affected: Versions earlier than 9.1.0.135(C00E133R2P1)
Create a notification for this product.
    Huawei HUAWEI P20 Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P20 Pro Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P30 Affected: Versions earlier than 9.1.0.193
Create a notification for this product.
    Huawei HUAWEI P30 Pro Affected: Versions earlier than 9.1.0.186(C00E180R2P1)
Create a notification for this product.
    Huawei HUAWEI Y9 2019 Affected: Versions earlier than 9.1.0.220(C605E3R1P1T8)
Create a notification for this product.
    Huawei HUAWEI nova lite 3 Affected: Versions earlier than 9.1.0.305(C635E8R2P2)
Create a notification for this product.
    Huawei Honor 10 Lite Affected: Versions earlier than 9.1.0.283(C605E8R2P2)
Create a notification for this product.
    Huawei Honor 8X Affected: Versions earlier than 9.1.0.221(C461E2R1P1T8)
Create a notification for this product.
    Huawei Honor View 20 Affected: Versions earlier than 9.1.0.238(C432E1R3P1)
Create a notification for this product.
    Huawei Jackman-L22 Affected: Versions earlier than 9.1.0.247(C636E2R4P1T8)
Create a notification for this product.
    Huawei Paris-L21B Affected: Versions earlier than 9.1.0.331(C432E1R1P2T8)
Create a notification for this product.
    Huawei Paris-L21MEB Affected: Versions earlier than 9.1.0.331(C185E4R1P3T8)
Create a notification for this product.
    Huawei Paris-L29B Affected: Versions earlier than 9.1.0.331(C636E1R1P3T8)
Create a notification for this product.
    Huawei Sydney-AL00 Affected: Versions earlier than 9.1.0.212(C00E62R1P7T8)
Create a notification for this product.
    Huawei Charlotte-L29C Affected: Versions earlier than 9.1.0.325(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.335(C636E3R1P13T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Affected: Versions earlier than 9.1.0.336(C605E3R1P12T8)
Create a notification for this product.
    Huawei Columbia-AL10B Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Columbia-L29D Affected: Versions earlier than 9.1.0.350(C461E3R1P11T8)
Affected: Versions earlier than 9.1.0.350(C185E3R1P12T8)
Affected: Versions earlier than 9.1.0.350(C10E5R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Create a notification for this product.
    Huawei Cornell-AL00A Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Cornell-L29A Affected: Versions earlier than 9.1.0.328(C185E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C432E1R1P9T8)
Affected: Versions earlier than 9.1.0.330(C461E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C636E2R1P12T8)
Create a notification for this product.
    Huawei Emily-L09C Affected: Versions earlier than 9.1.0.336(C605E4R1P12T8)
Affected: Versions earlier than 9.1.0.311(C185E2R1P12T8)
Affected: Versions earlier than 9.1.0.345(C432E10R1P12T8)
Create a notification for this product.
    Huawei Emily-L29C Affected: Versions earlier than 9.1.0.311(C605E2R1P12T8)
Affected: Versions earlier than 9.1.0.311(C636E7R1P13T8)
Affected: Versions earlier than 9.1.0.311(C432E7R1P11T8)
Create a notification for this product.
    Huawei Ever-L29B Affected: Versions earlier than 9.1.0.311(C185E3R3P1)
Create a notification for this product.
    Huawei ALP-AL00B Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: Versions earlier than 9.1.0.300(C432E4R1P9T8)
Create a notification for this product.
    Huawei ALP-L29 Affected: Versions earlier than 9.1.0.315(C636E5R1P13T8)
Create a notification for this product.
    Huawei BLA-L29C Affected: Versions earlier than 9.1.0.321(C636E4R1P14T8)
Affected: Versions earlier than 9.1.0.330(C432E6R1P12T8)
Affected: Versions earlier than 9.1.0.302(C635E4R1P13T8)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: Versions earlier than 9.1.0.350(C10E3R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Affected: Versions earlier than 9.1.0.350(C636E4R1P13T8)
Create a notification for this product.
    Huawei Charlotte-L09C Affected: Versions earlier than 9.1.0.311(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:52.990Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Sydney-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L01",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Yale-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C432E2R3P2)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C461E2R2P1)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C636E2R2P1)"
            }
          ]
        },
        {
          "product": "Honor 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.152(C00E150R5P1)"
            }
          ]
        },
        {
          "product": "Honor Magic2",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 10.0.0.187"
            }
          ]
        },
        {
          "product": "Honor V20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.131(C00E131R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.310(C185E10R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 RS",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C786E133R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C00E133R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI P20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.193"
            }
          ]
        },
        {
          "product": "HUAWEI P30 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.186(C00E180R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Y9 2019",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI nova lite 3",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.305(C635E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.283(C605E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 8X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Honor View 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.238(C432E1R3P1)"
            }
          ]
        },
        {
          "product": "Jackman-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
            }
          ]
        },
        {
          "product": "Paris-L21B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Paris-L21MEB",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
            }
          ]
        },
        {
          "product": "Paris-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
            }
          ]
        },
        {
          "product": "Sydney-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
            }
          ]
        },
        {
          "product": "Columbia-AL10B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Columbia-L29D",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            }
          ]
        },
        {
          "product": "Cornell-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Cornell-L29A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
            }
          ]
        },
        {
          "product": "Ever-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E3R3P1)"
            }
          ]
        },
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-27T19:50:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5302",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Sydney-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L21BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yale-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C432E2R3P2)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C461E2R2P1)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C636E2R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.152(C00E150R5P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor Magic2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 10.0.0.187"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor V20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.234(C00E234R4P3)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HUAWEI Mate 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.131(C00E131R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.310(C185E10R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 RS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C786E133R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C00E133R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.193"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.186(C00E180R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Y9 2019",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova lite 3",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.305(C635E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.283(C605E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 8X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor View 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.238(C432E1R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Jackman-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21MEB",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Charlotte-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-AL10B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-L29D",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-L29A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ever-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E3R3P1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Charlotte-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5302",
    "datePublished": "2020-04-27T19:50:50",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:52.990Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-19412 (GCVE-0-2019-19412)

Vulnerability from cvelistv5 – Published: 2020-06-08 18:21 – Updated: 2024-08-05 02:16
VLAI?
Summary
Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en.
Severity ?
No CVSS data available.
CWE
  • FRP Bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: earlier than 9.0.0.181(C00E87R2P20T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: earlier than 9.0.0.201(C432E4R1P9)
Create a notification for this product.
    Huawei ALP-L29 Affected: earlier than 9.0.0.177(C185E2R1P12T8)
Affected: earlier than 9.0.0.195(C636E2R1P12)
Create a notification for this product.
    Huawei Anne-AL00 Affected: earlier than 8.0.0.168(C00)
Create a notification for this product.
    Huawei BLA-AL00B Affected: earlier than 9.0.0.181(C00E88R2P15T8)
Create a notification for this product.
    Huawei BLA-L09C Affected: earlier than 9.0.0.177(C185E2R1P13T8)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Create a notification for this product.
    Huawei BLA-L29C Affected: earlier than 9.0.0.179(C576E2R1P7T8)
Affected: earlier than 9.0.0.194(C185E2R1P13)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Affected: earlier than 9.0.0.210(C635E4R1P13)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: earlier than 9.0.0.156(C00E156R2P14T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: earlier than 8.0.0.172(C432)
Affected: earlier than 8.0.0.173(C636)
Create a notification for this product.
    Huawei Emily-L29C Affected: earlier than 9.0.0.159(C185E2R1P12T8)
Affected: earlier than 9.0.0.159(C461E2R1P11T8)
Affected: earlier than 9.0.0.160(C432E7R1P11T8)
Affected: earlier than 9.0.0.165(C605E2R1P12)
Affected: earlier than 9.0.0.168(C636E7R1P13T8)
Affected: earlier than 9.0.0.168(C782E3R1P11T8)
Affected: earlier than 9.0.0.196(C635E2R1P11T8)
Create a notification for this product.
    Huawei Figo-L03 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L21 Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C635E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L23 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L31 Affected: earlier than 9.1.0.130(C432E8R1P5T8)
Create a notification for this product.
    Huawei Florida-L03 Affected: earlier than 9.1.0.121(C605E5R1P1T8)
Create a notification for this product.
    Huawei Florida-L21 Affected: earlier than 8.0.0.129(C605)
Affected: earlier than 8.0.0.131(C432)
Affected: earlier than 8.0.0.132(C185)
Create a notification for this product.
    Huawei Florida-L22 Affected: earlier than 8.0.0.132(C636)
Create a notification for this product.
    Huawei Florida-L23 Affected: earlier than 8.0.0.144(C605)
Create a notification for this product.
    Huawei HUAWEI P smart Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P smart,HUAWEI Y7s Affected: earlier than 9.1.0.124(C636E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P20 lite Affected: earlier than 8.0.0.148(C635)
Affected: earlier than 8.0.0.155(C185)
Affected: earlier than 8.0.0.155(C605)
Affected: earlier than 8.0.0.156(C605)
Affected: earlier than 8.0.0.157(C432)
Create a notification for this product.
    Huawei HUAWEI nova 3e,HUAWEI P20 lite Affected: earlier than 8.0.0.147(C461)
Affected: earlier than 8.0.0.148(ZAFC185)
Affected: earlier than 8.0.0.160(C185)
Affected: earlier than 8.0.0.160(C605)
Affected: earlier than 8.0.0.168(C432)
Affected: earlier than 8.0.0.172(C636)
Create a notification for this product.
    Huawei Honor View 10 Affected: earlier than 9.0.0.202(C567E6R1P12T8)
Create a notification for this product.
    Huawei Leland-AL00A Affected: earlier than 8.0.0.182(C00)
Create a notification for this product.
    Huawei Leland-L21A Affected: earlier than 8.0.0.135(C185)
Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22A Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22C Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L31A Affected: earlier than 8.0.0.139(C432)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E87R2P20T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.201(C432E4R1P9)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.195(C636E2R1P12)"
            }
          ]
        },
        {
          "product": "Anne-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C00)"
            }
          ]
        },
        {
          "product": "BLA-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E88R2P15T8)"
            }
          ]
        },
        {
          "product": "BLA-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.179(C576E2R1P7T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.194(C185E2R1P13)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.210(C635E4R1P13)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.156(C00E156R2P14T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.173(C636)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C461E2R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.160(C432E7R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.165(C605E2R1P12)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C782E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.196(C635E2R1P11T8)"
            }
          ]
        },
        {
          "product": "Figo-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C635E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L31",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C432E8R1P5T8)"
            }
          ]
        },
        {
          "product": "Florida-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.121(C605E5R1P1T8)"
            }
          ]
        },
        {
          "product": "Florida-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.129(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.131(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C185)"
            }
          ]
        },
        {
          "product": "Florida-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C636)"
            }
          ]
        },
        {
          "product": "Florida-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.144(C605)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart,HUAWEI Y7s",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.124(C636E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(C635)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.156(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.157(C432)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 3e,HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.147(C461)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(ZAFC185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C636)"
            }
          ]
        },
        {
          "product": "Honor View 10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.202(C567E6R1P12T8)"
            }
          ]
        },
        {
          "product": "Leland-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.182(C00)"
            }
          ]
        },
        {
          "product": "Leland-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.135(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L31A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.139(C432)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "FRP Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T15:29:39",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19412",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.201(C432E4R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.195(C636E2R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.168(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.194(C185E2R1P13)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.210(C635E4R1P13)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.172(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.173(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.165(C605E2R1P12)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Figo-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L31",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.129(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.131(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.132(C185)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.132(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.144(C605)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart,HUAWEI Y7s",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.148(C635)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.156(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.157(C432)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.147(C461)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.148(ZAFC185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.168(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.172(C636)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor View 10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.182(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.135(C185)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L31A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.139(C432)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "FRP Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19412",
    "datePublished": "2020-06-08T18:21:28",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5303 (GCVE-0-2019-5303)

Vulnerability from cvelistv5 – Published: 2020-04-27 20:01 – Updated: 2024-08-04 19:54
VLAI?
Summary
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: Versions earlier than 9.1.0.300(C432E4R1P9T8)
Create a notification for this product.
    Huawei ALP-L29 Affected: Versions earlier than 9.1.0.315(C636E5R1P13T8)
Create a notification for this product.
    Huawei BLA-L29C Affected: Versions earlier than 9.1.0.321(C636E4R1P14T8)
Affected: Versions earlier than 9.1.0.330(C432E6R1P12T8)
Affected: Versions earlier than 9.1.0.302(C635E4R1P13T8)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: Versions earlier than 9.1.0.350(C10E3R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Affected: Versions earlier than 9.1.0.350(C636E4R1P13T8)
Create a notification for this product.
    Huawei Charlotte-L09C Affected: Versions earlier than 9.1.0.311(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Create a notification for this product.
    Huawei Charlotte-L29C Affected: Versions earlier than 9.1.0.325(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.335(C636E3R1P13T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Affected: Versions earlier than 9.1.0.336(C605E3R1P12T8)
Create a notification for this product.
    Huawei Columbia-AL10B Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Columbia-L29D Affected: Versions earlier than 9.1.0.350(C461E3R1P11T8)
Affected: Versions earlier than 9.1.0.350(C185E3R1P12T8)
Affected: Versions earlier than 9.1.0.350(C10E5R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Create a notification for this product.
    Huawei Cornell-AL00A Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Cornell-L29A Affected: Versions earlier than 9.1.0.328(C185E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C432E1R1P9T8)
Affected: Versions earlier than 9.1.0.330(C461E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C636E2R1P12T8)
Create a notification for this product.
    Huawei Emily-L09C Affected: Versions earlier than 9.1.0.336(C605E4R1P12T8)
Affected: Versions earlier than 9.1.0.311(C185E2R1P12T8)
Affected: Versions earlier than 9.1.0.345(C432E10R1P12T8)
Create a notification for this product.
    Huawei Emily-L29C Affected: Versions earlier than 9.1.0.311(C605E2R1P12T8)
Affected: Versions earlier than 9.1.0.311(C636E7R1P13T8)
Affected: Versions earlier than 9.1.0.311(C432E7R1P11T8)
Create a notification for this product.
    Huawei Ever-L29B Affected: Versions earlier than 9.1.0.311(C185E3R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Affected: Versions earlier than 9.1.0.131(C00E131R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Pro Affected: Versions earlier than 9.1.0.310(C185E10R2P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 RS Affected: Versions earlier than 9.1.0.135(C786E133R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 X Affected: Versions earlier than 9.1.0.135(C00E133R2P1)
Create a notification for this product.
    Huawei HUAWEI P20 Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P20 Pro Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P30 Affected: Versions earlier than 9.1.0.193
Create a notification for this product.
    Huawei HUAWEI P30 Pro Affected: Versions earlier than 9.1.0.186(C00E180R2P1)
Create a notification for this product.
    Huawei HUAWEI Y9 2019 Affected: Versions earlier than 9.1.0.220(C605E3R1P1T8)
Create a notification for this product.
    Huawei HUAWEI nova lite 3 Affected: Versions earlier than 9.1.0.305(C635E8R2P2)
Create a notification for this product.
    Huawei Honor 10 Lite Affected: Versions earlier than 9.1.0.283(C605E8R2P2)
Create a notification for this product.
    Huawei Honor 8X Affected: Versions earlier than 9.1.0.221(C461E2R1P1T8)
Create a notification for this product.
    Huawei Honor View 20 Affected: Versions earlier than 9.1.0.238(C432E1R3P1)
Create a notification for this product.
    Huawei Jackman-L22 Affected: Versions earlier than 9.1.0.247(C636E2R4P1T8)
Create a notification for this product.
    Huawei Paris-L21B Affected: Versions earlier than 9.1.0.331(C432E1R1P2T8)
Create a notification for this product.
    Huawei Paris-L21MEB Affected: Versions earlier than 9.1.0.331(C185E4R1P3T8)
Create a notification for this product.
    Huawei Paris-L29B Affected: Versions earlier than 9.1.0.331(C636E1R1P3T8)
Create a notification for this product.
    Huawei Sydney-AL00 Affected: Versions earlier than 9.1.0.212(C00E62R1P7T8)
Create a notification for this product.
    Huawei Sydney-L21 Affected: Versions earlier than 9.1.0.215(C432E1R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L21BR Affected: Versions earlier than 9.1.0.213(C185E1R1P2T8)
Create a notification for this product.
    Huawei Sydney-L22 Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L22BR Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-AL00 Affected: Versions earlier than 9.1.0.228(C00E78R1P7T8)
Create a notification for this product.
    Huawei SydneyM-L01 Affected: Versions earlier than 9.1.0.215(C782E2R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Affected: Versions earlier than 9.1.0.270(C432E3R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L03 Affected: Versions earlier than 9.1.0.217(C605E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L21 Affected: Versions earlier than 9.1.0.221(C461E1R1P1T8)
Affected: Versions earlier than 9.1.0.215(C432E4R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L22 Affected: Versions earlier than 9.1.0.259(C185E1R1P2T8)
Affected: Versions earlier than 9.1.0.220(C635E1R1P2T8)
Affected: Versions earlier than 9.1.0.216(C569E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L23 Affected: Versions earlier than 9.1.0.226(C605E2R1P1T8)
Create a notification for this product.
    Huawei Yale-L21A Affected: Versions earlier than 9.1.0.154(C432E2R3P2)
Affected: Versions earlier than 9.1.0.154(C461E2R2P1)
Affected: Versions earlier than 9.1.0.154(C636E2R2P1)
Create a notification for this product.
    Huawei Honor 20 Affected: Versions earlier than 9.1.0.152(C00E150R5P1)
Create a notification for this product.
    Huawei Honor Magic2 Affected: Versions earlier than 10.0.0.187
Create a notification for this product.
    Huawei Honor V20 Affected: Versions earlier than 9.1.0.234(C00E234R4P3)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:53.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
            }
          ]
        },
        {
          "product": "Columbia-AL10B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Columbia-L29D",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            }
          ]
        },
        {
          "product": "Cornell-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Cornell-L29A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
            }
          ]
        },
        {
          "product": "Ever-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E3R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.131(C00E131R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.310(C185E10R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 RS",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C786E133R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C00E133R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI P20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.193"
            }
          ]
        },
        {
          "product": "HUAWEI P30 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.186(C00E180R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Y9 2019",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI nova lite 3",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.305(C635E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.283(C605E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 8X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Honor View 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.238(C432E1R3P1)"
            }
          ]
        },
        {
          "product": "Jackman-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
            }
          ]
        },
        {
          "product": "Paris-L21B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Paris-L21MEB",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
            }
          ]
        },
        {
          "product": "Paris-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
            }
          ]
        },
        {
          "product": "Sydney-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L01",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Yale-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C432E2R3P2)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C461E2R2P1)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C636E2R2P1)"
            }
          ]
        },
        {
          "product": "Honor 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.152(C00E150R5P1)"
            }
          ]
        },
        {
          "product": "Honor Magic2",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 10.0.0.187"
            }
          ]
        },
        {
          "product": "Honor V20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-27T20:01:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Charlotte-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Charlotte-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-AL10B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-L29D",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-L29A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ever-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E3R3P1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HUAWEI Mate 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.131(C00E131R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.310(C185E10R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 RS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C786E133R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C00E133R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.193"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.186(C00E180R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Y9 2019",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova lite 3",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.305(C635E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.283(C605E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 8X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor View 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.238(C432E1R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Jackman-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21MEB",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Sydney-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L21BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yale-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C432E2R3P2)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C461E2R2P1)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C636E2R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.152(C00E150R5P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor Magic2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 10.0.0.187"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor V20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.234(C00E234R4P3)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5303",
    "datePublished": "2020-04-27T20:01:02",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:53.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5302 (GCVE-0-2019-5302)

Vulnerability from cvelistv5 – Published: 2020-04-27 19:50 – Updated: 2024-08-04 19:54
VLAI?
Summary
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
References
Impacted products
Vendor Product Version
Huawei Sydney-L21 Affected: Versions earlier than 9.1.0.215(C432E1R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L21BR Affected: Versions earlier than 9.1.0.213(C185E1R1P2T8)
Create a notification for this product.
    Huawei Sydney-L22 Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei Sydney-L22BR Affected: Versions earlier than 9.1.0.258(C636E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-AL00 Affected: Versions earlier than 9.1.0.228(C00E78R1P7T8)
Create a notification for this product.
    Huawei SydneyM-L01 Affected: Versions earlier than 9.1.0.215(C782E2R1P1T8)
Affected: Versions earlier than 9.1.0.213(C185E1R1P1T8)
Affected: Versions earlier than 9.1.0.270(C432E3R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L03 Affected: Versions earlier than 9.1.0.217(C605E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L21 Affected: Versions earlier than 9.1.0.221(C461E1R1P1T8)
Affected: Versions earlier than 9.1.0.215(C432E4R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L22 Affected: Versions earlier than 9.1.0.259(C185E1R1P2T8)
Affected: Versions earlier than 9.1.0.220(C635E1R1P2T8)
Affected: Versions earlier than 9.1.0.216(C569E1R1P1T8)
Create a notification for this product.
    Huawei SydneyM-L23 Affected: Versions earlier than 9.1.0.226(C605E2R1P1T8)
Create a notification for this product.
    Huawei Yale-L21A Affected: Versions earlier than 9.1.0.154(C432E2R3P2)
Affected: Versions earlier than 9.1.0.154(C461E2R2P1)
Affected: Versions earlier than 9.1.0.154(C636E2R2P1)
Create a notification for this product.
    Huawei Honor 20 Affected: Versions earlier than 9.1.0.152(C00E150R5P1)
Create a notification for this product.
    Huawei Honor Magic2 Affected: Versions earlier than 10.0.0.187
Create a notification for this product.
    Huawei Honor V20 Affected: Versions earlier than 9.1.0.234(C00E234R4P3)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Affected: Versions earlier than 9.1.0.131(C00E131R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 Pro Affected: Versions earlier than 9.1.0.310(C185E10R2P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 RS Affected: Versions earlier than 9.1.0.135(C786E133R3P1)
Create a notification for this product.
    Huawei HUAWEI Mate 20 X Affected: Versions earlier than 9.1.0.135(C00E133R2P1)
Create a notification for this product.
    Huawei HUAWEI P20 Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P20 Pro Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei HUAWEI P30 Affected: Versions earlier than 9.1.0.193
Create a notification for this product.
    Huawei HUAWEI P30 Pro Affected: Versions earlier than 9.1.0.186(C00E180R2P1)
Create a notification for this product.
    Huawei HUAWEI Y9 2019 Affected: Versions earlier than 9.1.0.220(C605E3R1P1T8)
Create a notification for this product.
    Huawei HUAWEI nova lite 3 Affected: Versions earlier than 9.1.0.305(C635E8R2P2)
Create a notification for this product.
    Huawei Honor 10 Lite Affected: Versions earlier than 9.1.0.283(C605E8R2P2)
Create a notification for this product.
    Huawei Honor 8X Affected: Versions earlier than 9.1.0.221(C461E2R1P1T8)
Create a notification for this product.
    Huawei Honor View 20 Affected: Versions earlier than 9.1.0.238(C432E1R3P1)
Create a notification for this product.
    Huawei Jackman-L22 Affected: Versions earlier than 9.1.0.247(C636E2R4P1T8)
Create a notification for this product.
    Huawei Paris-L21B Affected: Versions earlier than 9.1.0.331(C432E1R1P2T8)
Create a notification for this product.
    Huawei Paris-L21MEB Affected: Versions earlier than 9.1.0.331(C185E4R1P3T8)
Create a notification for this product.
    Huawei Paris-L29B Affected: Versions earlier than 9.1.0.331(C636E1R1P3T8)
Create a notification for this product.
    Huawei Sydney-AL00 Affected: Versions earlier than 9.1.0.212(C00E62R1P7T8)
Create a notification for this product.
    Huawei Charlotte-L29C Affected: Versions earlier than 9.1.0.325(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.335(C636E3R1P13T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Affected: Versions earlier than 9.1.0.336(C605E3R1P12T8)
Create a notification for this product.
    Huawei Columbia-AL10B Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Columbia-L29D Affected: Versions earlier than 9.1.0.350(C461E3R1P11T8)
Affected: Versions earlier than 9.1.0.350(C185E3R1P12T8)
Affected: Versions earlier than 9.1.0.350(C10E5R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Create a notification for this product.
    Huawei Cornell-AL00A Affected: Versions earlier than 9.1.0.333(C00E333R1P1T8)
Create a notification for this product.
    Huawei Cornell-L29A Affected: Versions earlier than 9.1.0.328(C185E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C432E1R1P9T8)
Affected: Versions earlier than 9.1.0.330(C461E1R1P9T8)
Affected: Versions earlier than 9.1.0.328(C636E2R1P12T8)
Create a notification for this product.
    Huawei Emily-L09C Affected: Versions earlier than 9.1.0.336(C605E4R1P12T8)
Affected: Versions earlier than 9.1.0.311(C185E2R1P12T8)
Affected: Versions earlier than 9.1.0.345(C432E10R1P12T8)
Create a notification for this product.
    Huawei Emily-L29C Affected: Versions earlier than 9.1.0.311(C605E2R1P12T8)
Affected: Versions earlier than 9.1.0.311(C636E7R1P13T8)
Affected: Versions earlier than 9.1.0.311(C432E7R1P11T8)
Create a notification for this product.
    Huawei Ever-L29B Affected: Versions earlier than 9.1.0.311(C185E3R3P1)
Create a notification for this product.
    Huawei ALP-AL00B Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: Versions earlier than 9.1.0.300(C432E4R1P9T8)
Create a notification for this product.
    Huawei ALP-L29 Affected: Versions earlier than 9.1.0.315(C636E5R1P13T8)
Create a notification for this product.
    Huawei BLA-L29C Affected: Versions earlier than 9.1.0.321(C636E4R1P14T8)
Affected: Versions earlier than 9.1.0.330(C432E6R1P12T8)
Affected: Versions earlier than 9.1.0.302(C635E4R1P13T8)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: Versions earlier than 9.1.0.333(C00E333R2P1T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: Versions earlier than 9.1.0.350(C10E3R1P14T8)
Affected: Versions earlier than 9.1.0.351(C432E5R1P13T8)
Affected: Versions earlier than 9.1.0.350(C636E4R1P13T8)
Create a notification for this product.
    Huawei Charlotte-L09C Affected: Versions earlier than 9.1.0.311(C185E4R1P11T8)
Affected: Versions earlier than 9.1.0.345(C432E8R1P11T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:52.990Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Sydney-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L21BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "Sydney-L22BR",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L01",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
            }
          ]
        },
        {
          "product": "SydneyM-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Yale-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C432E2R3P2)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C461E2R2P1)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.154(C636E2R2P1)"
            }
          ]
        },
        {
          "product": "Honor 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.152(C00E150R5P1)"
            }
          ]
        },
        {
          "product": "Honor Magic2",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 10.0.0.187"
            }
          ]
        },
        {
          "product": "Honor V20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.131(C00E131R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.310(C185E10R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 RS",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C786E133R3P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Mate 20 X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.135(C00E133R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI P20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.193"
            }
          ]
        },
        {
          "product": "HUAWEI P30 Pro",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.186(C00E180R2P1)"
            }
          ]
        },
        {
          "product": "HUAWEI Y9 2019",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
            }
          ]
        },
        {
          "product": "HUAWEI nova lite 3",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.305(C635E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.283(C605E8R2P2)"
            }
          ]
        },
        {
          "product": "Honor 8X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
            }
          ]
        },
        {
          "product": "Honor View 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.238(C432E1R3P1)"
            }
          ]
        },
        {
          "product": "Jackman-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
            }
          ]
        },
        {
          "product": "Paris-L21B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
            }
          ]
        },
        {
          "product": "Paris-L21MEB",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
            }
          ]
        },
        {
          "product": "Paris-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
            }
          ]
        },
        {
          "product": "Sydney-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
            }
          ]
        },
        {
          "product": "Columbia-AL10B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Columbia-L29D",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            }
          ]
        },
        {
          "product": "Cornell-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
            }
          ]
        },
        {
          "product": "Cornell-L29A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
            }
          ]
        },
        {
          "product": "Ever-L29B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E3R3P1)"
            }
          ]
        },
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
            }
          ]
        },
        {
          "product": "Charlotte-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-27T19:50:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5302",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Sydney-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L21BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-L22BR",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.258(C636E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.228(C00E78R1P7T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C782E2R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.213(C185E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.270(C432E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.217(C605E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E1R1P1T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.215(C432E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.259(C185E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C635E1R1P2T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.216(C569E1R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SydneyM-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.226(C605E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Yale-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C432E2R3P2)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C461E2R2P1)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.154(C636E2R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.152(C00E150R5P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor Magic2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 10.0.0.187"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor V20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.234(C00E234R4P3)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HUAWEI Mate 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.131(C00E131R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.310(C185E10R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 RS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C786E133R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Mate 20 X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.135(C00E133R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.193"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 Pro",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.186(C00E180R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI Y9 2019",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.220(C605E3R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova lite 3",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.305(C635E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.283(C605E8R2P2)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 8X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.221(C461E2R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor View 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.238(C432E1R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Jackman-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.247(C636E2R4P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C432E1R1P2T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L21MEB",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C185E4R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Paris-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.331(C636E1R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Sydney-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.212(C00E62R1P7T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Charlotte-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.325(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.335(C636E3R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E3R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-AL10B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-L29D",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C461E3R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C185E3R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E5R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Cornell-L29A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C185E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C432E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C461E1R1P9T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.328(C636E2R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.336(C605E4R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E10R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C605E2R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C432E7R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ever-L29B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E3R3P1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.300(C432E4R1P9T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.315(C636E5R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.321(C636E4R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.330(C432E6R1P12T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.302(C635E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C10E3R1P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.351(C432E5R1P13T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.350(C636E4R1P13T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Charlotte-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than 9.1.0.311(C185E4R1P11T8)"
                          },
                          {
                            "version_value": "Versions earlier than 9.1.0.345(C432E8R1P11T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5302",
    "datePublished": "2020-04-27T19:50:50",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:52.990Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}