Search criteria
1 vulnerability found for frd-l02 by huawei
VAR-201711-0237
Vulnerability from variot - Updated: 2025-04-20 23:35Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed. Huawei Smartphone software contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. HuaweiBerlin-L21, L21HN, L22, L22HN, L23, L24HN, and FRD-L02, L04, L09, L14, and L19 are all Huawei smartphones. Huawei Berlin-L21 and others are all smartphone products of China's Huawei (Huawei). Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei Berlin-L21 Berlin-L21C10B130 version, Berlin-L21C185B133 version, Berlin-L21HN Berlin-L21HNC10B131 version, Berlin-L21HNC185B140 version, Berlin-L21HNC432B151 version; Berlin-L22HNC636B130 Version, Berlin-L22HNC675B150CUSTC675D001 Version; Berlin-L23 Berlin-L23C605B131 Version; Berlin-L24HN Berlin-L24HNC567B110 Version; FRD-L02 FRD-L02C432B120 Version, FRD-L02C635B130 Version, FRD-L02C675B170CUSTC675D001 Version; FRD-L04 FRD-L04C567B162 Version, FRD-L04C605B131 version; FRD-L09 FRD-L09C10B130 version, FRD-L09C185B130 version, FRD-L09C432B131 version, FRD-L09C636B130 version; FRD-L14 FRD-L14C567B162 version; , FRD-L19C636B130 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0237",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "berlin-l21",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l21c10b130"
},
{
"model": "berlin-l21",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l21c185b133"
},
{
"model": "berlin-l21hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l21hnc10b131"
},
{
"model": "berlin-l21hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l21hnc185b140"
},
{
"model": "berlin-l21hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l21hnc432b151"
},
{
"model": "berlin-l22",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l22c636b160"
},
{
"model": "berlin-l22hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l22hnc636b130"
},
{
"model": "berlin-l22hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l22hnc675b150custc675d001"
},
{
"model": "berlin-l23",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l23c605b131"
},
{
"model": "berlin-l24hn",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "berlin-l24hnc567b110"
},
{
"model": "frd-l02",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l02c432b120"
},
{
"model": "frd-l02",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l02c635b130"
},
{
"model": "frd-l02",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l02c675b170custc675d001"
},
{
"model": "frd-l04",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l04c567b162"
},
{
"model": "frd-l04",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l04c605b131"
},
{
"model": "frd-l09",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l09c10b130"
},
{
"model": "frd-l09",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l09c185b130"
},
{
"model": "frd-l09",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l09c432b131"
},
{
"model": "frd-l09",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l09c636b130"
},
{
"model": "frd-l14",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l14c567b162"
},
{
"model": "frd-l19",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l19c10b130"
},
{
"model": "frd-l19",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l19c432b131"
},
{
"model": "frd-l19",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "frd-l19c636b130"
},
{
"model": "berlin-l21 berlin-l21c10b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l21 berlin-l21c185b133",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l22 berlin-l22c636b160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l23 berlin-l23c605b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l21hn berlin-l21hnc10b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l21hn berlin-l21hnc185b140",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l21hn berlin-l21hnc432b151",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l22hn berlin-l22hnc636b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l22hn berlin-l22hnc675b150custc675d001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "berlin-l24hn berlin-l24hnc567b110",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l02 frd-l02c432b120",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l02 frd-l02c635b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l02 frd-l02c675b170custc675d001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l04 frd-l04c567b162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l04 frd-l04c605b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l09 frd-l09c10b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l09 frd-l09c185b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l09 frd-l09c432b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l09 frd-l09c636b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l14 frd-l14c567b162",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l19 frd-l19c10b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l19 frd-l19c432b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "frd-l19 frd-l19c636b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:berlin-l21_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:berlin-l21hn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:berlin-l22_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:berlin-l22hn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:berlin-l23_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:berlin-l24hn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:frd-l02_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:frd-l04_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:frd-l09_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:frd-l14_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:frd-l19_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
}
]
},
"cve": "CVE-2017-2721",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-2721",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-33956",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "VHN-110924",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 0.9,
"id": "CVE-2017-2721",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-2721",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-2721",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-33956",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-1003",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-110924",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed. Huawei Smartphone software contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. HuaweiBerlin-L21, L21HN, L22, L22HN, L23, L24HN, and FRD-L02, L04, L09, L14, and L19 are all Huawei smartphones. Huawei Berlin-L21 and others are all smartphone products of China\u0027s Huawei (Huawei). Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei Berlin-L21 Berlin-L21C10B130 version, Berlin-L21C185B133 version, Berlin-L21HN Berlin-L21HNC10B131 version, Berlin-L21HNC185B140 version, Berlin-L21HNC432B151 version; Berlin-L22HNC636B130 Version, Berlin-L22HNC675B150CUSTC675D001 Version; Berlin-L23 Berlin-L23C605B131 Version; Berlin-L24HN Berlin-L24HNC567B110 Version; FRD-L02 FRD-L02C432B120 Version, FRD-L02C635B130 Version, FRD-L02C675B170CUSTC675D001 Version; FRD-L04 FRD-L04C567B162 Version, FRD-L04C605B131 version; FRD-L09 FRD-L09C10B130 version, FRD-L09C185B130 version, FRD-L09C432B131 version, FRD-L09C636B130 version; FRD-L14 FRD-L14C567B162 version; , FRD-L19C636B130 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-2721"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-2721",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33956",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-110924",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"id": "VAR-201711-0237",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
}
],
"trust": 1.6257142880000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
}
]
},
"last_update_date": "2025-04-20T23:35:40.868000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20170920-01-frpbypass",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170920-01-frpbypass-en"
},
{
"title": "A variety of Huawei mobile phone security bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/106061"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76713"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110924"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170920-01-frpbypass-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2721"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2721"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"db": "VULHUB",
"id": "VHN-110924"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"date": "2017-11-22T00:00:00",
"db": "VULHUB",
"id": "VHN-110924"
},
{
"date": "2017-12-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"date": "2017-11-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"date": "2017-11-22T19:29:01.397000",
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33956"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-110924"
},
{
"date": "2017-12-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010808"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-1003"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-2721"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Vulnerabilities related to authorization, authority, and access control in smartphone software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010808"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-1003"
}
],
"trust": 0.6
}
}