Search criteria

8 vulnerabilities found for honor_view_10_firmware by huawei

CVE-2019-19412 (GCVE-0-2019-19412)

Vulnerability from nvd – Published: 2020-06-08 18:21 – Updated: 2024-08-05 02:16
VLAI?
Summary
Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en.
Severity ?
No CVSS data available.
CWE
  • FRP Bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: earlier than 9.0.0.181(C00E87R2P20T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: earlier than 9.0.0.201(C432E4R1P9)
Create a notification for this product.
    Huawei ALP-L29 Affected: earlier than 9.0.0.177(C185E2R1P12T8)
Affected: earlier than 9.0.0.195(C636E2R1P12)
Create a notification for this product.
    Huawei Anne-AL00 Affected: earlier than 8.0.0.168(C00)
Create a notification for this product.
    Huawei BLA-AL00B Affected: earlier than 9.0.0.181(C00E88R2P15T8)
Create a notification for this product.
    Huawei BLA-L09C Affected: earlier than 9.0.0.177(C185E2R1P13T8)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Create a notification for this product.
    Huawei BLA-L29C Affected: earlier than 9.0.0.179(C576E2R1P7T8)
Affected: earlier than 9.0.0.194(C185E2R1P13)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Affected: earlier than 9.0.0.210(C635E4R1P13)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: earlier than 9.0.0.156(C00E156R2P14T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: earlier than 8.0.0.172(C432)
Affected: earlier than 8.0.0.173(C636)
Create a notification for this product.
    Huawei Emily-L29C Affected: earlier than 9.0.0.159(C185E2R1P12T8)
Affected: earlier than 9.0.0.159(C461E2R1P11T8)
Affected: earlier than 9.0.0.160(C432E7R1P11T8)
Affected: earlier than 9.0.0.165(C605E2R1P12)
Affected: earlier than 9.0.0.168(C636E7R1P13T8)
Affected: earlier than 9.0.0.168(C782E3R1P11T8)
Affected: earlier than 9.0.0.196(C635E2R1P11T8)
Create a notification for this product.
    Huawei Figo-L03 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L21 Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C635E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L23 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L31 Affected: earlier than 9.1.0.130(C432E8R1P5T8)
Create a notification for this product.
    Huawei Florida-L03 Affected: earlier than 9.1.0.121(C605E5R1P1T8)
Create a notification for this product.
    Huawei Florida-L21 Affected: earlier than 8.0.0.129(C605)
Affected: earlier than 8.0.0.131(C432)
Affected: earlier than 8.0.0.132(C185)
Create a notification for this product.
    Huawei Florida-L22 Affected: earlier than 8.0.0.132(C636)
Create a notification for this product.
    Huawei Florida-L23 Affected: earlier than 8.0.0.144(C605)
Create a notification for this product.
    Huawei HUAWEI P smart Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P smart,HUAWEI Y7s Affected: earlier than 9.1.0.124(C636E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P20 lite Affected: earlier than 8.0.0.148(C635)
Affected: earlier than 8.0.0.155(C185)
Affected: earlier than 8.0.0.155(C605)
Affected: earlier than 8.0.0.156(C605)
Affected: earlier than 8.0.0.157(C432)
Create a notification for this product.
    Huawei HUAWEI nova 3e,HUAWEI P20 lite Affected: earlier than 8.0.0.147(C461)
Affected: earlier than 8.0.0.148(ZAFC185)
Affected: earlier than 8.0.0.160(C185)
Affected: earlier than 8.0.0.160(C605)
Affected: earlier than 8.0.0.168(C432)
Affected: earlier than 8.0.0.172(C636)
Create a notification for this product.
    Huawei Honor View 10 Affected: earlier than 9.0.0.202(C567E6R1P12T8)
Create a notification for this product.
    Huawei Leland-AL00A Affected: earlier than 8.0.0.182(C00)
Create a notification for this product.
    Huawei Leland-L21A Affected: earlier than 8.0.0.135(C185)
Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22A Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22C Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L31A Affected: earlier than 8.0.0.139(C432)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E87R2P20T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.201(C432E4R1P9)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.195(C636E2R1P12)"
            }
          ]
        },
        {
          "product": "Anne-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C00)"
            }
          ]
        },
        {
          "product": "BLA-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E88R2P15T8)"
            }
          ]
        },
        {
          "product": "BLA-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.179(C576E2R1P7T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.194(C185E2R1P13)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.210(C635E4R1P13)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.156(C00E156R2P14T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.173(C636)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C461E2R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.160(C432E7R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.165(C605E2R1P12)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C782E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.196(C635E2R1P11T8)"
            }
          ]
        },
        {
          "product": "Figo-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C635E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L31",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C432E8R1P5T8)"
            }
          ]
        },
        {
          "product": "Florida-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.121(C605E5R1P1T8)"
            }
          ]
        },
        {
          "product": "Florida-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.129(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.131(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C185)"
            }
          ]
        },
        {
          "product": "Florida-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C636)"
            }
          ]
        },
        {
          "product": "Florida-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.144(C605)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart,HUAWEI Y7s",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.124(C636E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(C635)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.156(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.157(C432)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 3e,HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.147(C461)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(ZAFC185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C636)"
            }
          ]
        },
        {
          "product": "Honor View 10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.202(C567E6R1P12T8)"
            }
          ]
        },
        {
          "product": "Leland-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.182(C00)"
            }
          ]
        },
        {
          "product": "Leland-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.135(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L31A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.139(C432)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "FRP Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T15:29:39",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19412",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.201(C432E4R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.195(C636E2R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.168(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.194(C185E2R1P13)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.210(C635E4R1P13)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.172(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.173(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.165(C605E2R1P12)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Figo-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L31",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.129(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.131(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.132(C185)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.132(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.144(C605)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart,HUAWEI Y7s",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.148(C635)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.156(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.157(C432)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.147(C461)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.148(ZAFC185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.168(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.172(C636)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor View 10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.182(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.135(C185)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L31A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.139(C432)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "FRP Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19412",
    "datePublished": "2020-06-08T18:21:28",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-9506 (GCVE-0-2019-9506)

Vulnerability from nvd – Published: 2019-08-14 16:27 – Updated: 2024-09-16 19:14
VLAI?
Title
Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CWE
Assigner
References
https://www.kb.cert.org/vuls/id/918987/ third-party-advisoryx_refsource_CERT-VN
http://www.cs.ox.ac.uk/publications/publication12… x_refsource_MISC
https://www.usenix.org/conference/usenixsecurity1… x_refsource_MISC
https://www.bluetooth.com/security/statement-key-… x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2019/Aug/14 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/11 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/13 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/15 mailing-listx_refsource_FULLDISC
http://www.huawei.com/en/psirt/security-advisorie… x_refsource_CONFIRM
https://usn.ubuntu.com/4115-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://usn.ubuntu.com/4147-1/ vendor-advisoryx_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2975 vendor-advisoryx_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://access.redhat.com/errata/RHSA-2019:3076 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3055 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3089 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3187 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3165 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3217 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3220 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3231 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3218 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3309 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3517 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0204 vendor-advisoryx_refsource_REDHAT
Impacted products
Vendor Product Version
Bluetooth BR/EDR Affected: 5.1 , ≤ 5.1 (custom)
Create a notification for this product.
Credits
Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#918987",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/918987/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
          },
          {
            "name": "USN-4115-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4115-1/"
          },
          {
            "name": "USN-4118-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4118-1/"
          },
          {
            "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
          },
          {
            "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
          },
          {
            "name": "USN-4147-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4147-1/"
          },
          {
            "name": "RHSA-2019:2975",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2975"
          },
          {
            "name": "openSUSE-SU-2019:2307",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
          },
          {
            "name": "openSUSE-SU-2019:2308",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
          },
          {
            "name": "RHSA-2019:3076",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3076"
          },
          {
            "name": "RHSA-2019:3055",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3055"
          },
          {
            "name": "RHSA-2019:3089",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3089"
          },
          {
            "name": "RHSA-2019:3187",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3187"
          },
          {
            "name": "RHSA-2019:3165",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3165"
          },
          {
            "name": "RHSA-2019:3217",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3217"
          },
          {
            "name": "RHSA-2019:3220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3220"
          },
          {
            "name": "RHSA-2019:3231",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3231"
          },
          {
            "name": "RHSA-2019:3218",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3218"
          },
          {
            "name": "RHSA-2019:3309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3309"
          },
          {
            "name": "RHSA-2019:3517",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3517"
          },
          {
            "name": "RHSA-2020:0204",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0204"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "N/A"
          ],
          "product": "BR/EDR",
          "vendor": "Bluetooth",
          "versions": [
            {
              "lessThanOrEqual": "5.1",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
        }
      ],
      "datePublic": "2019-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-310",
              "description": "CWE-310 Cryptographic Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-30T10:06:23",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#918987",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/918987/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
        },
        {
          "name": "USN-4115-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4115-1/"
        },
        {
          "name": "USN-4118-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4118-1/"
        },
        {
          "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
        },
        {
          "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
        },
        {
          "name": "USN-4147-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4147-1/"
        },
        {
          "name": "RHSA-2019:2975",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2975"
        },
        {
          "name": "openSUSE-SU-2019:2307",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
        },
        {
          "name": "openSUSE-SU-2019:2308",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
        },
        {
          "name": "RHSA-2019:3076",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3076"
        },
        {
          "name": "RHSA-2019:3055",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3055"
        },
        {
          "name": "RHSA-2019:3089",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3089"
        },
        {
          "name": "RHSA-2019:3187",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3187"
        },
        {
          "name": "RHSA-2019:3165",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3165"
        },
        {
          "name": "RHSA-2019:3217",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3217"
        },
        {
          "name": "RHSA-2019:3220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3220"
        },
        {
          "name": "RHSA-2019:3231",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3231"
        },
        {
          "name": "RHSA-2019:3218",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3218"
        },
        {
          "name": "RHSA-2019:3309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "name": "RHSA-2019:3517",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3517"
        },
        {
          "name": "RHSA-2020:0204",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0204"
        }
      ],
      "source": {
        "advisory": "VU#918987",
        "defect": [
          "VU#918987"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
      "workarounds": [
        {
          "lang": "en",
          "value": "Bluetooth SIG Expedited Errata Correction 11838"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.7"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "KNOB",
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-08-14",
          "ID": "CVE-2019-9506",
          "STATE": "PUBLIC",
          "TITLE": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BR/EDR",
                      "version": {
                        "version_data": [
                          {
                            "platform": "N/A",
                            "version_affected": "\u003c=",
                            "version_name": "5.1",
                            "version_value": "5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bluetooth"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.7"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-310 Cryptographic Issues"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#918987",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/918987/"
            },
            {
              "name": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
              "refsource": "MISC",
              "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
            },
            {
              "name": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
              "refsource": "MISC",
              "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
            },
            {
              "name": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
              "refsource": "CONFIRM",
              "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
            },
            {
              "name": "USN-4115-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4115-1/"
            },
            {
              "name": "USN-4118-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4118-1/"
            },
            {
              "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
            },
            {
              "name": "USN-4147-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4147-1/"
            },
            {
              "name": "RHSA-2019:2975",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2975"
            },
            {
              "name": "openSUSE-SU-2019:2307",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
            },
            {
              "name": "openSUSE-SU-2019:2308",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
            },
            {
              "name": "RHSA-2019:3076",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3076"
            },
            {
              "name": "RHSA-2019:3055",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3055"
            },
            {
              "name": "RHSA-2019:3089",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3089"
            },
            {
              "name": "RHSA-2019:3187",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3187"
            },
            {
              "name": "RHSA-2019:3165",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3165"
            },
            {
              "name": "RHSA-2019:3217",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3217"
            },
            {
              "name": "RHSA-2019:3220",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3220"
            },
            {
              "name": "RHSA-2019:3231",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3231"
            },
            {
              "name": "RHSA-2019:3218",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3218"
            },
            {
              "name": "RHSA-2019:3309",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3309"
            },
            {
              "name": "RHSA-2019:3517",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3517"
            },
            {
              "name": "RHSA-2020:0204",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0204"
            }
          ]
        },
        "source": {
          "advisory": "VU#918987",
          "defect": [
            "VU#918987"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Bluetooth SIG Expedited Errata Correction 11838"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9506",
    "datePublished": "2019-08-14T16:27:45.059869Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-16T19:14:13.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5295 (GCVE-0-2019-5295)

Vulnerability from nvd – Published: 2019-06-06 14:39 – Updated: 2024-08-04 19:54
VLAI?
Summary
Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization.
Severity ?
No CVSS data available.
CWE
  • authorization bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei Honor V10 Affected: Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:53.234Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honor V10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)"
            }
          ]
        }
      ],
      "datePublic": "2019-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "authorization bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:39:27",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5295",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor V10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "authorization bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5295",
    "datePublished": "2019-06-06T14:39:27",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:53.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5216 (GCVE-0-2019-5216)

Vulnerability from nvd – Published: 2019-06-06 14:31 – Updated: 2024-08-04 19:47
VLAI?
Summary
There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code.
Severity ?
No CVSS data available.
CWE
  • race condition
Assigner
References
Impacted products
Vendor Product Version
Huawei Honor V10, Honor 10, Honor Play Affected: Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)
Affected: Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)
Affected: Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honor V10, Honor 10, Honor Play",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)"
            }
          ]
        }
      ],
      "datePublic": "2019-01-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "race condition",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:31:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5216",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor V10, Honor 10, Honor Play",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)"
                          },
                          {
                            "version_value": "Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "race condition"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5216",
    "datePublished": "2019-06-06T14:31:50",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-19412 (GCVE-0-2019-19412)

Vulnerability from cvelistv5 – Published: 2020-06-08 18:21 – Updated: 2024-08-05 02:16
VLAI?
Summary
Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en.
Severity ?
No CVSS data available.
CWE
  • FRP Bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei ALP-AL00B Affected: earlier than 9.0.0.181(C00E87R2P20T8)
Create a notification for this product.
    Huawei ALP-L09 Affected: earlier than 9.0.0.201(C432E4R1P9)
Create a notification for this product.
    Huawei ALP-L29 Affected: earlier than 9.0.0.177(C185E2R1P12T8)
Affected: earlier than 9.0.0.195(C636E2R1P12)
Create a notification for this product.
    Huawei Anne-AL00 Affected: earlier than 8.0.0.168(C00)
Create a notification for this product.
    Huawei BLA-AL00B Affected: earlier than 9.0.0.181(C00E88R2P15T8)
Create a notification for this product.
    Huawei BLA-L09C Affected: earlier than 9.0.0.177(C185E2R1P13T8)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Create a notification for this product.
    Huawei BLA-L29C Affected: earlier than 9.0.0.179(C576E2R1P7T8)
Affected: earlier than 9.0.0.194(C185E2R1P13)
Affected: earlier than 9.0.0.206(C432E4R1P11)
Affected: earlier than 9.0.0.210(C635E4R1P13)
Create a notification for this product.
    Huawei Berkeley-AL20 Affected: earlier than 9.0.0.156(C00E156R2P14T8)
Create a notification for this product.
    Huawei Berkeley-L09 Affected: earlier than 8.0.0.172(C432)
Affected: earlier than 8.0.0.173(C636)
Create a notification for this product.
    Huawei Emily-L29C Affected: earlier than 9.0.0.159(C185E2R1P12T8)
Affected: earlier than 9.0.0.159(C461E2R1P11T8)
Affected: earlier than 9.0.0.160(C432E7R1P11T8)
Affected: earlier than 9.0.0.165(C605E2R1P12)
Affected: earlier than 9.0.0.168(C636E7R1P13T8)
Affected: earlier than 9.0.0.168(C782E3R1P11T8)
Affected: earlier than 9.0.0.196(C635E2R1P11T8)
Create a notification for this product.
    Huawei Figo-L03 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L21 Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C635E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L23 Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei Figo-L31 Affected: earlier than 9.1.0.130(C432E8R1P5T8)
Create a notification for this product.
    Huawei Florida-L03 Affected: earlier than 9.1.0.121(C605E5R1P1T8)
Create a notification for this product.
    Huawei Florida-L21 Affected: earlier than 8.0.0.129(C605)
Affected: earlier than 8.0.0.131(C432)
Affected: earlier than 8.0.0.132(C185)
Create a notification for this product.
    Huawei Florida-L22 Affected: earlier than 8.0.0.132(C636)
Create a notification for this product.
    Huawei Florida-L23 Affected: earlier than 8.0.0.144(C605)
Create a notification for this product.
    Huawei HUAWEI P smart Affected: earlier than 9.1.0.130(C185E6R1P5T8)
Affected: earlier than 9.1.0.130(C605E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P smart,HUAWEI Y7s Affected: earlier than 9.1.0.124(C636E6R1P5T8)
Create a notification for this product.
    Huawei HUAWEI P20 lite Affected: earlier than 8.0.0.148(C635)
Affected: earlier than 8.0.0.155(C185)
Affected: earlier than 8.0.0.155(C605)
Affected: earlier than 8.0.0.156(C605)
Affected: earlier than 8.0.0.157(C432)
Create a notification for this product.
    Huawei HUAWEI nova 3e,HUAWEI P20 lite Affected: earlier than 8.0.0.147(C461)
Affected: earlier than 8.0.0.148(ZAFC185)
Affected: earlier than 8.0.0.160(C185)
Affected: earlier than 8.0.0.160(C605)
Affected: earlier than 8.0.0.168(C432)
Affected: earlier than 8.0.0.172(C636)
Create a notification for this product.
    Huawei Honor View 10 Affected: earlier than 9.0.0.202(C567E6R1P12T8)
Create a notification for this product.
    Huawei Leland-AL00A Affected: earlier than 8.0.0.182(C00)
Create a notification for this product.
    Huawei Leland-L21A Affected: earlier than 8.0.0.135(C185)
Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22A Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L22C Affected: earlier than 9.1.0.118(C636E4R1P1T8)
Create a notification for this product.
    Huawei Leland-L31A Affected: earlier than 8.0.0.139(C432)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALP-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E87R2P20T8)"
            }
          ]
        },
        {
          "product": "ALP-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.201(C432E4R1P9)"
            }
          ]
        },
        {
          "product": "ALP-L29",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.195(C636E2R1P12)"
            }
          ]
        },
        {
          "product": "Anne-AL00",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C00)"
            }
          ]
        },
        {
          "product": "BLA-AL00B",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.181(C00E88R2P15T8)"
            }
          ]
        },
        {
          "product": "BLA-L09C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.177(C185E2R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            }
          ]
        },
        {
          "product": "BLA-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.179(C576E2R1P7T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.194(C185E2R1P13)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.206(C432E4R1P11)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.210(C635E4R1P13)"
            }
          ]
        },
        {
          "product": "Berkeley-AL20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.156(C00E156R2P14T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.173(C636)"
            }
          ]
        },
        {
          "product": "Emily-L29C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C185E2R1P12T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.159(C461E2R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.160(C432E7R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.165(C605E2R1P12)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C636E7R1P13T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.168(C782E3R1P11T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.0.0.196(C635E2R1P11T8)"
            }
          ]
        },
        {
          "product": "Figo-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C635E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "Figo-L31",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C432E8R1P5T8)"
            }
          ]
        },
        {
          "product": "Florida-L03",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.121(C605E5R1P1T8)"
            }
          ]
        },
        {
          "product": "Florida-L21",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.129(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.131(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C185)"
            }
          ]
        },
        {
          "product": "Florida-L22",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.132(C636)"
            }
          ]
        },
        {
          "product": "Florida-L23",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.144(C605)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C185E6R1P5T8)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.130(C605E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P smart,HUAWEI Y7s",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.124(C636E6R1P5T8)"
            }
          ]
        },
        {
          "product": "HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(C635)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.155(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.156(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.157(C432)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 3e,HUAWEI P20 lite",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.147(C461)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.148(ZAFC185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.160(C605)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.168(C432)"
            },
            {
              "status": "affected",
              "version": "earlier than 8.0.0.172(C636)"
            }
          ]
        },
        {
          "product": "Honor View 10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.202(C567E6R1P12T8)"
            }
          ]
        },
        {
          "product": "Leland-AL00A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.182(C00)"
            }
          ]
        },
        {
          "product": "Leland-L21A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.135(C185)"
            },
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L22C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.118(C636E4R1P1T8)"
            }
          ]
        },
        {
          "product": "Leland-L31A",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 8.0.0.139(C432)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "FRP Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T15:29:39",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19412",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ALP-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.201(C432E4R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ALP-L29",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.195(C636E2R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.168(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-AL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L09C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "BLA-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.194(C185E2R1P13)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.206(C432E4R1P11)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.210(C635E4R1P13)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-AL20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.172(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.173(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Emily-L29C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.165(C605E2R1P12)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
                          },
                          {
                            "version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Figo-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Figo-L31",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L03",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L21",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.129(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.131(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.132(C185)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L22",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.132(C636)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Florida-L23",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.144(C605)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P smart,HUAWEI Y7s",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.148(C635)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.155(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.156(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.157(C432)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.147(C461)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.148(ZAFC185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C185)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.160(C605)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.168(C432)"
                          },
                          {
                            "version_value": "earlier than 8.0.0.172(C636)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor View 10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-AL00A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.182(C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L21A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.135(C185)"
                          },
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L22C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Leland-L31A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 8.0.0.139(C432)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "FRP Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19412",
    "datePublished": "2020-06-08T18:21:28",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-9506 (GCVE-0-2019-9506)

Vulnerability from cvelistv5 – Published: 2019-08-14 16:27 – Updated: 2024-09-16 19:14
VLAI?
Title
Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CWE
Assigner
References
https://www.kb.cert.org/vuls/id/918987/ third-party-advisoryx_refsource_CERT-VN
http://www.cs.ox.ac.uk/publications/publication12… x_refsource_MISC
https://www.usenix.org/conference/usenixsecurity1… x_refsource_MISC
https://www.bluetooth.com/security/statement-key-… x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2019/Aug/14 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/11 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/13 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/15 mailing-listx_refsource_FULLDISC
http://www.huawei.com/en/psirt/security-advisorie… x_refsource_CONFIRM
https://usn.ubuntu.com/4115-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://usn.ubuntu.com/4147-1/ vendor-advisoryx_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2975 vendor-advisoryx_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://access.redhat.com/errata/RHSA-2019:3076 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3055 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3089 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3187 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3165 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3217 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3220 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3231 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3218 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3309 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3517 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0204 vendor-advisoryx_refsource_REDHAT
Impacted products
Vendor Product Version
Bluetooth BR/EDR Affected: 5.1 , ≤ 5.1 (custom)
Create a notification for this product.
Credits
Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#918987",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/918987/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
          },
          {
            "name": "USN-4115-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4115-1/"
          },
          {
            "name": "USN-4118-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4118-1/"
          },
          {
            "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
          },
          {
            "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
          },
          {
            "name": "USN-4147-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4147-1/"
          },
          {
            "name": "RHSA-2019:2975",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2975"
          },
          {
            "name": "openSUSE-SU-2019:2307",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
          },
          {
            "name": "openSUSE-SU-2019:2308",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
          },
          {
            "name": "RHSA-2019:3076",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3076"
          },
          {
            "name": "RHSA-2019:3055",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3055"
          },
          {
            "name": "RHSA-2019:3089",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3089"
          },
          {
            "name": "RHSA-2019:3187",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3187"
          },
          {
            "name": "RHSA-2019:3165",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3165"
          },
          {
            "name": "RHSA-2019:3217",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3217"
          },
          {
            "name": "RHSA-2019:3220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3220"
          },
          {
            "name": "RHSA-2019:3231",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3231"
          },
          {
            "name": "RHSA-2019:3218",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3218"
          },
          {
            "name": "RHSA-2019:3309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3309"
          },
          {
            "name": "RHSA-2019:3517",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3517"
          },
          {
            "name": "RHSA-2020:0204",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0204"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "N/A"
          ],
          "product": "BR/EDR",
          "vendor": "Bluetooth",
          "versions": [
            {
              "lessThanOrEqual": "5.1",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
        }
      ],
      "datePublic": "2019-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-310",
              "description": "CWE-310 Cryptographic Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-30T10:06:23",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#918987",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/918987/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
        },
        {
          "name": "USN-4115-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4115-1/"
        },
        {
          "name": "USN-4118-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4118-1/"
        },
        {
          "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
        },
        {
          "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
        },
        {
          "name": "USN-4147-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4147-1/"
        },
        {
          "name": "RHSA-2019:2975",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2975"
        },
        {
          "name": "openSUSE-SU-2019:2307",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
        },
        {
          "name": "openSUSE-SU-2019:2308",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
        },
        {
          "name": "RHSA-2019:3076",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3076"
        },
        {
          "name": "RHSA-2019:3055",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3055"
        },
        {
          "name": "RHSA-2019:3089",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3089"
        },
        {
          "name": "RHSA-2019:3187",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3187"
        },
        {
          "name": "RHSA-2019:3165",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3165"
        },
        {
          "name": "RHSA-2019:3217",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3217"
        },
        {
          "name": "RHSA-2019:3220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3220"
        },
        {
          "name": "RHSA-2019:3231",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3231"
        },
        {
          "name": "RHSA-2019:3218",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3218"
        },
        {
          "name": "RHSA-2019:3309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "name": "RHSA-2019:3517",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3517"
        },
        {
          "name": "RHSA-2020:0204",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0204"
        }
      ],
      "source": {
        "advisory": "VU#918987",
        "defect": [
          "VU#918987"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
      "workarounds": [
        {
          "lang": "en",
          "value": "Bluetooth SIG Expedited Errata Correction 11838"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.7"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "KNOB",
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-08-14",
          "ID": "CVE-2019-9506",
          "STATE": "PUBLIC",
          "TITLE": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BR/EDR",
                      "version": {
                        "version_data": [
                          {
                            "platform": "N/A",
                            "version_affected": "\u003c=",
                            "version_name": "5.1",
                            "version_value": "5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bluetooth"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.7"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-310 Cryptographic Issues"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#918987",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/918987/"
            },
            {
              "name": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
              "refsource": "MISC",
              "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
            },
            {
              "name": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
              "refsource": "MISC",
              "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
            },
            {
              "name": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
              "refsource": "CONFIRM",
              "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
            },
            {
              "name": "USN-4115-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4115-1/"
            },
            {
              "name": "USN-4118-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4118-1/"
            },
            {
              "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
            },
            {
              "name": "USN-4147-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4147-1/"
            },
            {
              "name": "RHSA-2019:2975",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2975"
            },
            {
              "name": "openSUSE-SU-2019:2307",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
            },
            {
              "name": "openSUSE-SU-2019:2308",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
            },
            {
              "name": "RHSA-2019:3076",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3076"
            },
            {
              "name": "RHSA-2019:3055",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3055"
            },
            {
              "name": "RHSA-2019:3089",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3089"
            },
            {
              "name": "RHSA-2019:3187",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3187"
            },
            {
              "name": "RHSA-2019:3165",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3165"
            },
            {
              "name": "RHSA-2019:3217",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3217"
            },
            {
              "name": "RHSA-2019:3220",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3220"
            },
            {
              "name": "RHSA-2019:3231",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3231"
            },
            {
              "name": "RHSA-2019:3218",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3218"
            },
            {
              "name": "RHSA-2019:3309",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3309"
            },
            {
              "name": "RHSA-2019:3517",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3517"
            },
            {
              "name": "RHSA-2020:0204",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0204"
            }
          ]
        },
        "source": {
          "advisory": "VU#918987",
          "defect": [
            "VU#918987"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Bluetooth SIG Expedited Errata Correction 11838"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9506",
    "datePublished": "2019-08-14T16:27:45.059869Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-16T19:14:13.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5295 (GCVE-0-2019-5295)

Vulnerability from cvelistv5 – Published: 2019-06-06 14:39 – Updated: 2024-08-04 19:54
VLAI?
Summary
Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization.
Severity ?
No CVSS data available.
CWE
  • authorization bypass
Assigner
References
Impacted products
Vendor Product Version
Huawei Honor V10 Affected: Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:53.234Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honor V10",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)"
            }
          ]
        }
      ],
      "datePublic": "2019-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "authorization bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:39:27",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5295",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor V10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "authorization bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190131-01-phone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5295",
    "datePublished": "2019-06-06T14:39:27",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:53.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5216 (GCVE-0-2019-5216)

Vulnerability from cvelistv5 – Published: 2019-06-06 14:31 – Updated: 2024-08-04 19:47
VLAI?
Summary
There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code.
Severity ?
No CVSS data available.
CWE
  • race condition
Assigner
References
Impacted products
Vendor Product Version
Huawei Honor V10, Honor 10, Honor Play Affected: Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)
Affected: Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)
Affected: Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honor V10, Honor 10, Honor Play",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)"
            },
            {
              "status": "affected",
              "version": "Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)"
            }
          ]
        }
      ],
      "datePublic": "2019-01-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "race condition",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:31:50",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5216",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honor V10, Honor 10, Honor Play",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8)"
                          },
                          {
                            "version_value": "Versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8)"
                          },
                          {
                            "version_value": "Versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a race condition vulnerability on Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.156(C00E156R2P14T8), Honor 10 smartphones versions earlier than Columbia-AL10B 9.0.0.156(C00E156R1P20T8) and Honor Play smartphones versions earlier than Cornell-AL00A 9.0.0.156(C00E156R1P13T8). An attacker tricks the user into installing a malicious application, which makes multiple processes to operate the same variate at the same time. Successful exploit could cause execution of malicious code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "race condition"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190116-01-smartphone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5216",
    "datePublished": "2019-06-06T14:31:50",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}