{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-5307", "ASSIGNER": "psirt@huawei.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Huawei", "product": { "product_data": [ { "product_name": "P30,P30 Pro", "version": { "version_data": [ { "version_value": "The versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)" }, { "version_value": "The versions before VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "message replay" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-replay-en", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-replay-en" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei 4G LTE devices, P30 versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1) and P30 Pro versions before VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1), are exposed to a message replay vulnerability. For the sake of better compatibility, these devices implement a less strict check on the NAS message sequence number (SN), specifically NAS COUNT. As a result, an attacker can construct a rogue base station and replay the GUTI reallocation command message in certain conditions to tamper with GUTIs, or replay the Identity request message to obtain IMSIs. (Vulnerability ID: HWPSIRT-2019-04107)" } ] } }