Search criteria
3 vulnerabilities found for vie-l09 by huawei
VAR-201711-0932
Vulnerability from variot - Updated: 2025-04-20 23:32Huawei smart phones with software earlier than VIE-L09C40B360 versions have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution. Huawei Smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiVIE-L09 is a smartphone from Huawei
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0932",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vie-l09",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "vie-l09c40b360"
},
{
"model": "vie-l09 \u003cvie-l09c40b360",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:vie-l09_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
}
]
},
"cve": "CVE-2017-8169",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-8169",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-34411",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2017-8169",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-8169",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-8169",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-34411",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-964",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULMON",
"id": "CVE-2017-8169",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei smart phones with software earlier than VIE-L09C40B360 versions have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution. Huawei Smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiVIE-L09 is a smartphone from Huawei",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8169"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "VULMON",
"id": "CVE-2017-8169"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-8169",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2017-34411",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2017-8169",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"id": "VAR-201711-0932",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
}
],
"trust": 1.25
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
}
]
},
"last_update_date": "2025-04-20T23:32:47.653000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171025-01-overflow",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-overflow-en"
},
{
"title": "HuaweiVIE-L09 Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/106309"
},
{
"title": "Huawei VIE-L09 Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76674"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-overflow-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8169"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-8169"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171025-01-overflow-cn"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"date": "2017-11-22T00:00:00",
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"date": "2017-11-22T19:29:03.943000",
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34411"
},
{
"date": "2017-12-08T00:00:00",
"db": "VULMON",
"id": "CVE-2017-8169"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010603"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-964"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-8169"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Buffer error vulnerability in smartphone software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010603"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-964"
}
],
"trust": 0.6
}
}
VAR-201711-0933
Vulnerability from variot - Updated: 2025-04-20 23:24Huawei smart phones with software earlier than VIE-L09C40B360 versions have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution. Huawei Smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiVIE-L09 is a smartphone from Huawei
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0933",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vie-l09",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "vie-l09c40b360"
},
{
"model": "vie-l09 \u003cvie-l09c40b360",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:vie-l09_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
}
]
},
"cve": "CVE-2017-8170",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-8170",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-34412",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2017-8170",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-8170",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-8170",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-34412",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-963",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei smart phones with software earlier than VIE-L09C40B360 versions have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the smart phone, causing the smartphone restart or arbitrary code execution. Huawei Smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiVIE-L09 is a smartphone from Huawei",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8170"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNVD",
"id": "CNVD-2017-34412"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-8170",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2017-34412",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"id": "VAR-201711-0933",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
}
],
"trust": 1.25
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
}
]
},
"last_update_date": "2025-04-20T23:24:50.459000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171025-01-overflow",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-overflow-en"
},
{
"title": "Patch for HuaweiVIE-L09 Buffer Overflow Vulnerability (CNVD-2017-34412)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/106310"
},
{
"title": "Huawei VIE-L09 Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76673"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-overflow-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8170"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-8170"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171025-01-overflow-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"date": "2017-11-22T19:29:03.990000",
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34412"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010604"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-963"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-8170"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Buffer error vulnerability in smartphone software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010604"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-963"
}
],
"trust": 0.6
}
}
VAR-201803-1363
Vulnerability from variot - Updated: 2024-11-23 23:05Some Huawei smart phones with software EVA-L09C34B142; EVA-L09C40B196; EVA-L09C432B210; EVA-L09C440B138; EVA-L09C464B150; EVA-L09C530B127; EVA-L09C55B190; EVA-L09C576B150; EVA-L09C635B221; EVA-L09C636B193; EVA-L09C675B130; EVA-L09C688B143; EVA-L09C703B160; EVA-L09C706B145; EVA-L09GBRC555B171; EVA-L09IRLC368B160; EVA-L19C10B190; EVA-L19C185B220; EVA-L19C20B160; EVA-L19C432B210; EVA-L19C636B190; EVA-L29C20B160; EVA-L29C636B191; EVA-TL00C01B198; VIE-L09C02B131; VIE-L09C109B181; VIE-L09C113B170; VIE-L09C150B170; VIE-L09C25B120; VIE-L09C40B181; VIE-L09C432B181; VIE-L09C55B170; VIE-L09C605B131; VIE-L09ITAC555B130; VIE-L29C10B170; VIE-L29C185B181; VIE-L29C605B131; VIE-L29C636B202 have a denial of service (DoS) vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Successful exploitation can cause camera application unusable. plural Huawei Smartphone software contains a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. The HuaweiEVA series and the VIE series are all smartphone products of China Huawei. The following products and versions are affected: Huawei EVA-AL10 EVA-AL10C00B198 version; EVA-CL00 EVA-CL00C92B198 version; EVA-DL00 EVA-DL00C17B198 version; EVA-L09 EVA-L09C02B143 version, EVA-L09C09B150 version, EVA-L09C113B150 Version, EVA-L09C150B192 Version, EVA-L09C178B161 Version, EVA-L09C185B180 Version, EVA-L09C22B140 Version, EVA-L09C25B133 Version, EVA-L09C33B191 Version, EVA-L09C34B142 Version, EVA-L09C40B196 Version, EVA-L09C432B210 Version, EVA-L09C440B138 Version, EVA-L09C464B150 Version, EVA-L09C530B127 Version, EVA-L09C55B190 Version, EVA-L09C576B150 Version, EVA-L09C635B221 Version, EVA-L09C636B193 Version, EVA-L09C675B130 Version, EVA-L09C688B143 Version, EVA-L09C703B160 Version, EVA-L09C706B145 Version, EVA-L09GBRC555B171 Version, EVA-L09IRLC368B160 Version; EVA-L19 EVA-L19C10B190 Version, EVA-L19C185B220 Version, EVA-L19C20B160 Version, EVA-L19C432B210 Version, EVA-L19C636B190 Version; EVA-L29 EVA-L29C20B160 Version , EVA-L29C636B191 version; EVA-TL00 EVA-TL00C01B198 version; VIE-L09..
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201803-1363",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l09c40b181"
},
{
"model": "eva-l29",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "eva-l29c636b191"
},
{
"model": "vie-l29",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l29c636b202"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l09c109b181"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l09c02b131"
},
{
"model": "eva-tl00",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "eva-tl00c01b198"
},
{
"model": "vie-l29",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l29c605b131"
},
{
"model": "vie-l29",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l29c10b170"
},
{
"model": "vie-l29",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l29c185b181"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "vie-l09c25b120"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c703b160"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c25b133"
},
{
"model": "eva-l29",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l29c20b160"
},
{
"model": "eva-l19",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l19c185b220"
},
{
"model": "eva-dl00",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-dl00c17b198"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c675b130"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c440b138"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c178b161"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c576b150"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c706b145"
},
{
"model": "eva-l19",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l19c10b190"
},
{
"model": "eva-l19",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l19c636b190"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c688b143"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c635b221"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c464b150"
},
{
"model": "eva-al10",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-al10c00b198"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c22b140"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c150b192"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c113b150"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c34b142"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09gbrc555b171"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c09b150"
},
{
"model": "eva-l19",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l19c432b210"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09c113b170"
},
{
"model": "eva-l19",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l19c20b160"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09irlc368b160"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c02b143"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c109b196"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c55b190"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c185b180"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09c150b170"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c40b196"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c636b193"
},
{
"model": "eva-cl00",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-cl00c92b198"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c33b191"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09c432b181"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c530b127"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09c55b170"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09c605b131"
},
{
"model": "vie-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "vie-l09itac555b130"
},
{
"model": "eva-l09",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "eva-l09c432b210"
},
{
"model": "eva-al10",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-cl00",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-dl00",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l19",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l29",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-tl00",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l29",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c02b143",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c09b150",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c109b196",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c113b150",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c150b192",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c178b161",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c185b180",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c22b140",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c25b133",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c33b191",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c34b142",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c40b196",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c432b210",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c440b138",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c464b150",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c530b127",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c55b1",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c55b190",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c576b150",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eval09c635b221",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c636b193",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c675b13",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c675b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c688b143",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c703b160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09c706b145",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09gbrc555b171",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l09 eva-l09irlc368b160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c02b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c109b181",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c113b170",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c150b170",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c25b120",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c40b181",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c432b181",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c55b170",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09c605b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l09 vie-l09itac555b130",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l29 vie-l29c10b170",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l29 vie-l29c185b181",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l29 vie-l29c605b131",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vie-l29 vie-l29c636b202",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-tl00 eva-tl00c01b198",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l29 eva-l29c20b160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l29 eva-l29c636b191",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l19 eva-l19c10b190",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l19 eva-l19c185b220",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l19 eva-l19c20b160",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-l19 eva-l19c432b210eva-l19c636b190",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-dl00 eva-dl00c17b198",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-cl00 eva-cl00c92b198",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eva-al10 eva-al10c00b198",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:eva-al10_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-cl00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-dl00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-l09_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-l19_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-l29_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:eva-tl00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:vie-l09_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:vie-l29_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Professor Zhiyun Qian from University of California, Riverside",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
}
],
"trust": 0.6
},
"cve": "CVE-2017-8164",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-8164",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-35593",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-116367",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.8,
"id": "CVE-2017-8164",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-8164",
"trust": 1.0,
"value": "LOW"
},
{
"author": "NVD",
"id": "CVE-2017-8164",
"trust": 0.8,
"value": "Low"
},
{
"author": "CNVD",
"id": "CNVD-2017-35593",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-1151",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116367",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some Huawei smart phones with software EVA-L09C34B142; EVA-L09C40B196; EVA-L09C432B210; EVA-L09C440B138; EVA-L09C464B150; EVA-L09C530B127; EVA-L09C55B190; EVA-L09C576B150; EVA-L09C635B221; EVA-L09C636B193; EVA-L09C675B130; EVA-L09C688B143; EVA-L09C703B160; EVA-L09C706B145; EVA-L09GBRC555B171; EVA-L09IRLC368B160; EVA-L19C10B190; EVA-L19C185B220; EVA-L19C20B160; EVA-L19C432B210; EVA-L19C636B190; EVA-L29C20B160; EVA-L29C636B191; EVA-TL00C01B198; VIE-L09C02B131; VIE-L09C109B181; VIE-L09C113B170; VIE-L09C150B170; VIE-L09C25B120; VIE-L09C40B181; VIE-L09C432B181; VIE-L09C55B170; VIE-L09C605B131; VIE-L09ITAC555B130; VIE-L29C10B170; VIE-L29C185B181; VIE-L29C605B131; VIE-L29C636B202 have a denial of service (DoS) vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Successful exploitation can cause camera application unusable. plural Huawei Smartphone software contains a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. The HuaweiEVA series and the VIE series are all smartphone products of China Huawei. The following products and versions are affected: Huawei EVA-AL10 EVA-AL10C00B198 version; EVA-CL00 EVA-CL00C92B198 version; EVA-DL00 EVA-DL00C17B198 version; EVA-L09 EVA-L09C02B143 version, EVA-L09C09B150 version, EVA-L09C113B150 Version, EVA-L09C150B192 Version, EVA-L09C178B161 Version, EVA-L09C185B180 Version, EVA-L09C22B140 Version, EVA-L09C25B133 Version, EVA-L09C33B191 Version, EVA-L09C34B142 Version, EVA-L09C40B196 Version, EVA-L09C432B210 Version, EVA-L09C440B138 Version, EVA-L09C464B150 Version, EVA-L09C530B127 Version, EVA-L09C55B190 Version, EVA-L09C576B150 Version, EVA-L09C635B221 Version, EVA-L09C636B193 Version, EVA-L09C675B130 Version, EVA-L09C688B143 Version, EVA-L09C703B160 Version, EVA-L09C706B145 Version, EVA-L09GBRC555B171 Version, EVA-L09IRLC368B160 Version; EVA-L19 EVA-L19C10B190 Version, EVA-L19C185B220 Version, EVA-L19C20B160 Version, EVA-L19C432B210 Version, EVA-L19C636B190 Version; EVA-L29 EVA-L29C20B160 Version , EVA-L29C636B191 version; EVA-TL00 EVA-TL00C01B198 version; VIE-L09..",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8164"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-8164",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-35593",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-116367",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"id": "VAR-201803-1363",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
}
],
"trust": 1.5036458437500002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
}
]
},
"last_update_date": "2024-11-23T23:05:09.765000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171129-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-smartphone-en"
},
{
"title": "Patch of several Huawei Product Denial of Service Vulnerabilities (CNVD-2017-35593)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/107381"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76806"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116367"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-smartphone-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8164"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-8164"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171129-01-smartphone-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"db": "VULHUB",
"id": "VHN-116367"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"date": "2018-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-116367"
},
{
"date": "2018-04-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"date": "2017-11-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"date": "2018-03-05T19:29:00.957000",
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-35593"
},
{
"date": "2018-03-29T00:00:00",
"db": "VULHUB",
"id": "VHN-116367"
},
{
"date": "2018-04-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012902"
},
{
"date": "2018-03-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-1151"
},
{
"date": "2024-11-21T03:33:26.990000",
"db": "NVD",
"id": "CVE-2017-8164"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability related to input validation in smartphone software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012902"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-1151"
}
],
"trust": 0.6
}
}