Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-5252 |
CWE-ID | CWE-287 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Huawei Enjoy 8 Plus Client/Desktop applications / Multimedia software Huawei Y9 Client/Desktop applications / Multimedia software Huawei Honor 8X Client/Desktop applications / Multimedia software Huawei Honor 9 Lite Client/Desktop applications / Multimedia software Huawei Honor 9i Client/Desktop applications / Multimedia software Huawei Y6 Pro Client/Desktop applications / Multimedia software |
Vendor | Huawei |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU23396
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-5252
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass authentication process.
The vulnerability exists due to the applock does not perform a sufficient authentication in a rare condition. An attacker with physical access to the device can use the application locked by applock in an instant when the phone's CPU is almost exhausted.
MitigationInstall updates from vendor's website.
Vulnerable software versionsHuawei Enjoy 8 Plus: before 9.1.0.124
Huawei Y9: before 9.1.0.139
Huawei Honor 8X: before 9.1.0.237
Huawei Honor 9 Lite: before 9.1.0.136
Huawei Honor 9i: before 9.1.0.122
Huawei Y6 Pro: before 9.1.0.248
External linkshttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.