diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json index 7e4d0953ab6..f7fd48d208d 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json @@ -2,23 +2,121 @@ "id": "CVE-2022-48314", "sourceIdentifier": "psirt@huawei.com", "published": "2023-04-16T08:15:07.387", - "lastModified": "2023-04-17T13:12:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-04-26T17:58:28.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3AD62E8B-CB4B-43A6-98E8-09A8A1A3505B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BCE0AFB0-A112-484B-BEAD-A7F1BDDCE313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 9733617c6d4..cf151c03fa9 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD in 2 hour periods. ### Last repository update ```plain -2023-04-26T16:00:11.832393+00:00 +2023-04-26T18:00:24.534103+00:00 ``` ### Most recent CVE modification timestamp synchronized with NVD ```plain -2023-04-26T15:42:38.570000+00:00 +2023-04-26T17:58:28.350000+00:00 ``` ### Last Data Feed release @@ -29,7 +29,7 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-datafeeds/r ### Total numbers of included CVEs ```plai#n -213597 +213603 ``` ### CVEs added in the last commit @@ -42,7 +42,7 @@ Recently added CVEs: `0` Recently modified CVEs: `1` -* CVE-2020-28163 (*2023-04-26T15:42:38.570*) +* CVE-2022-48314 (*2023-04-26T17:58:28.350*) ## Download and Usage