2024-12-08 03:06:42 +00:00

209 lines
6.3 KiB
JSON

{
"id": "CVE-2017-8161",
"sourceIdentifier": "psirt@huawei.com",
"published": "2017-11-22T19:29:03.740",
"lastModified": "2024-11-21T03:33:26.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EVA-L09 smartphones with software Earlier than EVA-L09C25B150CUSTC25D003 versions,Earlier than EVA-L09C440B140 versions,Earlier than EVA-L09C464B361 versions,Earlier than EVA-L09C675B320CUSTC675D004 versions have Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Swype and can perform some operations to update the Google account. As a result, the FRP function is bypassed."
},
{
"lang": "es",
"value": "Los smartphones EVA-L09 con software anterior a las versiones EVA-L09C25B150CUSTC25D003, EVA-L09C440B140, EVA-L09C464B361 y EVA-L09C675B320CUSTC675D004 tienen una vulnerabilidad de omisi\u00f3n de Factory Reset Protection (FRP). Cuando se reconfigura el tel\u00e9fono m\u00f3vil utilizando la funci\u00f3n Factory Reset Protection (FRP), un atacante puede iniciar sesi\u00f3n en Swype y realizar determinadas operaciones para actualizar la cuenta de Google. El resultado es que la funci\u00f3n FRP se omite."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
"baseScore": 4.9,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*",
"versionEndExcluding": "eva-l09c25b150custc25d003",
"matchCriteriaId": "BEA0A8C6-485E-49D4-A924-2671F594EB7A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A321BCC8-2C89-4D53-914D-3CDC1247E0FD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*",
"versionEndExcluding": "eva-l09c440b140",
"matchCriteriaId": "3A6644E1-0919-4B43-B2CE-9C05A42726B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A321BCC8-2C89-4D53-914D-3CDC1247E0FD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*",
"versionEndExcluding": "eva-l09c464b361",
"matchCriteriaId": "5BB54335-DBFD-4062-BDA3-D595BA872DA5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A321BCC8-2C89-4D53-914D-3CDC1247E0FD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*",
"versionEndExcluding": "l09c675b320custc675d004",
"matchCriteriaId": "D09445B1-BEBB-47B2-8270-613E9DE14897"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A321BCC8-2C89-4D53-914D-3CDC1247E0FD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171013-01-frpbypass-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171013-01-frpbypass-en",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}