Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-1791 CVE-2020-1797 |
CWE-ID | CWE-285 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Huawei Mate 20 Client/Desktop applications / Multimedia software |
Vendor | Huawei |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
Updated 27.05.2020
Added vulnerability #2
EUVDB-ID: #VU24943
Risk: Low
CVSSv3.1: 2.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-1791
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass authorization checks.
The vulnerability exists due to the system has a logic judging error under certain scenario. An attacker with physical access to the device can switch to third desktop after a series of operation in ADB mode.
MitigationInstall updates from vendor's website.
Vulnerable software versionsHuawei Mate 20: before 10.0.0.185
External linkshttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-smartphone-en
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28294
Risk: Low
CVSSv3.1: 2.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-1797
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass authorization checks.
The vulnerability exists due to the affected system does not properly restrict certain operation in ADB mode. An attacker with physical access to the device can break the limit of digital balance function.
MitigationInstall updates from vendor's website.
Vulnerable software versionsHuawei Mate 20: before 10.0.0.185
External linkshttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-03-smartphone-en
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.