SB2020052713 - Multiple vulnerabilities in Huawei P30, P30 Pro and Tony-AL00B



SB2020052713 - Multiple vulnerabilities in Huawei P30, P30 Pro and Tony-AL00B

Published: May 27, 2020 Updated: July 9, 2020

Security Bulletin ID SB2020052713
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2020-1798)

The vulnerability allows a local user to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests when handling NFC work. An authenticated attacker with physical access can establish a NFC connection to the target phone and perform a series of operations on the target phone, which is beyond the guest user's privilege.


2) Improper Authentication (CVE-ID: CVE-2020-9076)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the identity of the message sender is not properly verified. A remote attacker can perform a man-in-the-middle attack to induce user to access malicious URL and gain unauthorized access to the application.


3) Improper validation of integrity check value (CVE-ID: CVE-2020-1834)

The vulnerability allows an attacker to load a crafted software package to the device. 

The vulnerability exists due to the affected system does not check certain software package's integrity sufficiently. An attacker with physical access can load a specially crafted software package to the target device.  


4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2020-9226)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the affected software does not improper check signature of specific software package. A local user can trick a victim to install a malicious application and load a specially crafted software package to the device.


5) Information disclosure (CVE-ID: CVE-2020-9258)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to an attribution in a module is not set correctly and some verification is lacked. A local attacker can trick a victim to load malicious application and gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.