CVE-2022-37008 (GCVE-0-2022-37008)
Vulnerability from cvelistv5 – Published: 2022-08-09 20:10 – Updated: 2026-03-06 17:35
VLAI?
Summary
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability.
Severity ?
7.5 (High)
CWE
- Verification bypass vulnerability
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:21:32.469Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://consumer.huawei.com/en/support/bulletin/2022/8/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-37008",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-03T19:41:43.143927Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-345",
"description": "CWE-345 Insufficient Verification of Data Authenticity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T17:35:44.731Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "HarmonyOS",
"vendor": "Huawei",
"versions": [
{
"status": "affected",
"version": "2.0"
}
]
},
{
"product": "EMUI",
"vendor": "Huawei",
"versions": [
{
"status": "affected",
"version": "12.0.0"
},
{
"status": "affected",
"version": "11.0.1"
},
{
"status": "affected",
"version": "11.0.0"
}
]
},
{
"product": "Magic UI",
"vendor": "Huawei",
"versions": [
{
"status": "affected",
"version": "4.0.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Verification bypass vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-09T20:10:47.000Z",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://consumer.huawei.com/en/support/bulletin/2022/8/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2022-37008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HarmonyOS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.0"
}
]
}
},
{
"product_name": "EMUI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "12.0.0"
},
{
"version_affected": "=",
"version_value": "11.0.1"
},
{
"version_affected": "=",
"version_value": "11.0.0"
}
]
}
},
{
"product_name": "Magic UI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.0.0"
}
]
}
}
]
},
"vendor_name": "Huawei"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Verification bypass vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://consumer.huawei.com/en/support/bulletin/2022/8/",
"refsource": "MISC",
"url": "https://consumer.huawei.com/en/support/bulletin/2022/8/"
},
{
"name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177",
"refsource": "MISC",
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2022-37008",
"datePublished": "2022-08-09T20:10:47.000Z",
"dateReserved": "2022-07-28T00:00:00.000Z",
"dateUpdated": "2026-03-06T17:35:44.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-37008\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2022-08-10T20:16:04.967\",\"lastModified\":\"2026-03-06T18:16:15.810\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo recovery presenta una vulnerabilidad de omisi\u00f3n de verificaci\u00f3n de un paquete de actualizaci\u00f3n antes de su uso. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede afectar la estabilidad del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B701EC6-8208-4D22-95A6-B07D471A8A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"511F8CE2-C2B6-4A08-B992-49D9B75B8655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A974CA73-84E8-480B-BB4C-4A81D0C985B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD62E8B-CB4B-43A6-98E8-09A8A1A3505B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6066FAB-23F5-4CB2-B89E-B00F8835AC39\"}]}]}],\"references\":[{\"url\":\"https://consumer.huawei.com/en/support/bulletin/2022/8/\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://consumer.huawei.com/en/support/bulletin/2022/8/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://consumer.huawei.com/en/support/bulletin/2022/8/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T10:21:32.469Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-37008\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-03T19:41:43.143927Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-345\", \"description\": \"CWE-345 Insufficient Verification of Data Authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-06T17:35:40.820Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Huawei\", \"product\": \"HarmonyOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0\"}]}, {\"vendor\": \"Huawei\", \"product\": \"EMUI\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\"}, {\"status\": \"affected\", \"version\": \"11.0.1\"}, {\"status\": \"affected\", \"version\": \"11.0.0\"}]}, {\"vendor\": \"Huawei\", \"product\": \"Magic UI\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0.0\"}]}], \"references\": [{\"url\": \"https://consumer.huawei.com/en/support/bulletin/2022/8/\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Verification bypass vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"25ac1063-e409-4190-8079-24548c77ea2e\", \"shortName\": \"huawei\", \"dateUpdated\": \"2022-08-09T20:10:47.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"2.0\", \"version_affected\": \"=\"}]}, \"product_name\": \"HarmonyOS\"}, {\"version\": {\"version_data\": [{\"version_value\": \"12.0.0\", \"version_affected\": \"=\"}, {\"version_value\": \"11.0.1\", \"version_affected\": \"=\"}, {\"version_value\": \"11.0.0\", \"version_affected\": \"=\"}]}, \"product_name\": \"EMUI\"}, {\"version\": {\"version_data\": [{\"version_value\": \"4.0.0\", \"version_affected\": \"=\"}]}, \"product_name\": \"Magic UI\"}]}, \"vendor_name\": \"Huawei\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://consumer.huawei.com/en/support/bulletin/2022/8/\", \"name\": \"https://consumer.huawei.com/en/support/bulletin/2022/8/\", \"refsource\": \"MISC\"}, {\"url\": \"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\", \"name\": \"https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Verification bypass vulnerability\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-37008\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@huawei.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-37008\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-06T17:35:44.731Z\", \"dateReserved\": \"2022-07-28T00:00:00.000Z\", \"assignerOrgId\": \"25ac1063-e409-4190-8079-24548c77ea2e\", \"datePublished\": \"2022-08-09T20:10:47.000Z\", \"assignerShortName\": \"huawei\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…