2023-12-12 23:00:22 +00:00

121 lines
3.6 KiB
JSON

{
"id": "CVE-2023-6514",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:09.347",
"lastModified": "2023-12-12T21:20:07.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nThe Bluetooth module of some Huawei Smart Screen products has an identity authentication bypass vulnerability. Successful exploitation of this vulnerability may allow attackers to access restricted functions.\u00a0\n\nSuccessful exploitation of this vulnerability may allow attackers to access restricted functions.\n\n"
},
{
"lang": "es",
"value": "El m\u00f3dulo Bluetooth de algunos productos Huawei Smart Screen tiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de identidad. La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir a los atacantes acceder a funciones restringidas. La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir a los atacantes acceder a funciones restringidas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-840"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ajmd-370s_firmware:103.1.0.110\\(sp12c00e2r1p2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2F3A3C23-62F1-48D3-971E-720FF321F1AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ajmd-370s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA22073-D331-48E2-9F04-B7CBFC140D99"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-ibvishssp-4bf951d4-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}