FKIE_CVE-2021-22398

Vulnerability from fkie_nvd - Published: 2021-08-02 17:15 - Updated: 2024-11-21 05:50
Summary
There is a logic error vulnerability in several smartphones. The software does not properly restrict certain operation when the Digital Balance function is on. Successful exploit could allow the attacker to bypass the Digital Balance limit after a series of operations. Affected product versions include: Hulk-AL00C 9.1.1.201(C00E201R8P1);Jennifer-AN00C 10.1.1.171(C00E170R6P3);Jenny-AL10B 10.1.0.228(C00E220R5P1) and OxfordPL-AN10B 10.1.0.116(C00E110R2P1).
Impacted products
Vendor Product Version
huawei hulk-al00c_firmware 9.1.1.201\(c00e201r8p1\)
huawei hulk-al00c -
huawei jennifer-an00c_firmware 10.1.1.171\(c00e170r6p3\)
huawei jennifer-an00c -
huawei jenny-al10b_firmware 10.1.0.228\(c00e220r5p1\)
huawei jenny-al10b -
huawei oxfordpl-an10b_firmware 10.1.0.116\(c00e110r2p1\)
huawei oxfordpl-an10b -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:hulk-al00c_firmware:9.1.1.201\\(c00e201r8p1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E74D4D5D-D6B1-4EA4-ABE1-AFEA91C09B1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:hulk-al00c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "003DC3E4-C63A-43FD-A706-A5735AFADD5E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:jennifer-an00c_firmware:10.1.1.171\\(c00e170r6p3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "31044C41-A93D-4BB4-B4C4-43DFF7B5A85C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:jennifer-an00c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D8E538-1622-409A-847D-39DD04DC13C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:jenny-al10b_firmware:10.1.0.228\\(c00e220r5p1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F5632D-93F3-4963-9D72-3F9F3B448D07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:jenny-al10b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB497C74-7FAE-4C68-9C52-71AF200D4A73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oxfordpl-an10b_firmware:10.1.0.116\\(c00e110r2p1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BD57B349-61C7-4DFF-BD60-676A0D8C3C6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oxfordpl-an10b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BA5E3E0-703A-4292-8044-CB3D36072162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a logic error vulnerability in several smartphones. The software does not properly restrict certain operation when the Digital Balance function is on. Successful exploit could allow the attacker to bypass the Digital Balance limit after a series of operations. Affected product versions include: Hulk-AL00C 9.1.1.201(C00E201R8P1);Jennifer-AN00C 10.1.1.171(C00E170R6P3);Jenny-AL10B 10.1.0.228(C00E220R5P1) and OxfordPL-AN10B 10.1.0.116(C00E110R2P1)."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de error l\u00f3gico en varios smartphones. El software no restringe apropiadamente determinadas operaciones cuando la funci\u00f3n Digital Balance est\u00e1 activada. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir el l\u00edmite de Digital Balance despu\u00e9s de una serie de operaciones. Las versiones de producto afectadas son: Hulk-AL00C 9.1.1.201(C00E201R8P1);Jennifer-AN00C 10.1.1.171(C00E170R6P3);Jenny-AL10B 10.1.0.228(C00E220R5P1) y OxfordPL-AN10B 10.1.0.116(C00E110R2P1)"
    }
  ],
  "id": "CVE-2021-22398",
  "lastModified": "2024-11-21T05:50:02.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-02T17:15:14.173",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210714-01-smartphone-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210714-01-smartphone-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…