CNVD-2017-33956
Vulnerability from cnvd - Published: 2017-11-15
VLAI Severity ?
Title
多款Huawei手机安全绕过漏洞
Description
Huawei Berlin-L21、L21HN、L22、L22HN、L23、L24HN和FRD-L02、L04、L09、L14及L19都是华为(Huawei)公司的智能手机。
多款Huawei手机存在安全绕过漏洞,攻击者通过修改手机配置,从而导致FRP功能绕过。
Severity
高
Patch Name
多款Huawei手机安全绕过漏洞的补丁
Patch Description
Huawei Berlin-L21、L21HN、L22、L22HN、L23、L24HN和FRD-L02、L04、L09、L14及L19都是华为(Huawei)公司的智能手机。
多款Huawei手机存在安全绕过漏洞,攻击者通过修改手机配置,从而导致FRP功能绕过。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn
Reference
http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn
Impacted products
| Name | ['Huawei Berlin-L21 Berlin-L21C10B130', 'Huawei Berlin-L21 Berlin-L21C185B133', 'Huawei Berlin-L22 Berlin-L22C636B160', 'Huawei Berlin-L23 Berlin-L23C605B131', 'Huawei Berlin-L21HN Berlin-L21HNC10B131', 'Huawei Berlin-L21HN Berlin-L21HNC185B140', 'Huawei Berlin-L21HN Berlin-L21HNC432B151', 'Huawei Berlin-L22HN Berlin-L22HNC636B130', 'Huawei Berlin-L22HN Berlin-L22HNC675B150CUSTC675D001', 'Huawei Berlin-L24HN Berlin-L24HNC567B110', 'Huawei FRD-L02 FRD-L02C432B120', 'Huawei FRD-L02 FRD-L02C635B130', 'Huawei FRD-L02 FRD-L02C675B170CUSTC675D001', 'Huawei FRD-L04 FRD-L04C567B162', 'Huawei FRD-L04 FRD-L04C605B131', 'Huawei FRD-L09 FRD-L09C10B130', 'Huawei FRD-L09 FRD-L09C185B130', 'Huawei FRD-L09 FRD-L09C432B131', 'Huawei FRD-L09 FRD-L09C636B130', 'Huawei FRD-L14 FRD-L14C567B162', 'Huawei FRD-L19 FRD-L19C10B130', 'Huawei FRD-L19 FRD-L19C432B131', 'Huawei FRD-L19 FRD-L19C636B130'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-2721"
}
},
"description": "Huawei Berlin-L21\u3001L21HN\u3001L22\u3001L22HN\u3001L23\u3001L24HN\u548cFRD-L02\u3001L04\u3001L09\u3001L14\u53caL19\u90fd\u662f\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u667a\u80fd\u624b\u673a\u3002 \r\n\r\n\u591a\u6b3eHuawei\u624b\u673a\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u901a\u8fc7\u4fee\u6539\u624b\u673a\u914d\u7f6e\uff0c\u4ece\u800c\u5bfc\u81f4FRP\u529f\u80fd\u7ed5\u8fc7\u3002",
"discovererName": "Aleksi Ylanen",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-33956",
"openTime": "2017-11-15",
"patchDescription": "Huawei Berlin-L21\u3001L21HN\u3001L22\u3001L22HN\u3001L23\u3001L24HN\u548cFRD-L02\u3001L04\u3001L09\u3001L14\u53caL19\u90fd\u662f\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u667a\u80fd\u624b\u673a\u3002 \r\n\r\n\u591a\u6b3eHuawei\u624b\u673a\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u901a\u8fc7\u4fee\u6539\u624b\u673a\u914d\u7f6e\uff0c\u4ece\u800c\u5bfc\u81f4FRP\u529f\u80fd\u7ed5\u8fc7\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eHuawei\u624b\u673a\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Huawei Berlin-L21 Berlin-L21C10B130",
"Huawei Berlin-L21 Berlin-L21C185B133",
"Huawei Berlin-L22 Berlin-L22C636B160",
"Huawei Berlin-L23 Berlin-L23C605B131",
"Huawei Berlin-L21HN Berlin-L21HNC10B131",
"Huawei Berlin-L21HN Berlin-L21HNC185B140",
"Huawei Berlin-L21HN Berlin-L21HNC432B151",
"Huawei Berlin-L22HN Berlin-L22HNC636B130",
"Huawei Berlin-L22HN Berlin-L22HNC675B150CUSTC675D001",
"Huawei Berlin-L24HN Berlin-L24HNC567B110",
"Huawei FRD-L02 FRD-L02C432B120",
"Huawei FRD-L02 FRD-L02C635B130",
"Huawei FRD-L02 FRD-L02C675B170CUSTC675D001",
"Huawei FRD-L04 FRD-L04C567B162",
"Huawei FRD-L04 FRD-L04C605B131",
"Huawei FRD-L09 FRD-L09C10B130",
"Huawei FRD-L09 FRD-L09C185B130",
"Huawei FRD-L09 FRD-L09C432B131",
"Huawei FRD-L09 FRD-L09C636B130",
"Huawei FRD-L14 FRD-L14C567B162",
"Huawei FRD-L19 FRD-L19C10B130",
"Huawei FRD-L19 FRD-L19C432B131",
"Huawei FRD-L19 FRD-L19C636B130"
]
},
"referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20170920-01-frpbypass-cn",
"serverity": "\u9ad8",
"submitTime": "2017-09-21",
"title": "\u591a\u6b3eHuawei\u624b\u673a\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…