SB2020052713 - Multiple vulnerabilities in Huawei P30, P30 Pro and Tony-AL00B
Published: May 27, 2020 Updated: July 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper Authentication (CVE-ID: CVE-2020-1798)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests when handling NFC work. An authenticated attacker with physical access can establish a NFC connection to the target phone and perform a series of operations on the target phone, which is beyond the guest user's privilege.
2) Improper Authentication (CVE-ID: CVE-2020-9076)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the identity of the message sender is not properly verified. A remote attacker can perform a man-in-the-middle attack to induce user to access malicious URL and gain unauthorized access to the application.
3) Improper validation of integrity check value (CVE-ID: CVE-2020-1834)
The vulnerability allows an attacker to load a crafted software package to the device.
The vulnerability exists due to the affected system does not check certain software package's integrity sufficiently. An attacker with physical access can load a specially crafted software package to the target device.
4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2020-9226)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to the affected software does not improper check signature of specific software package. A local user can trick a victim to install a malicious application and load a specially crafted software package to the device.
5) Information disclosure (CVE-ID: CVE-2020-9258)
The vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to an attribution in a module is not set correctly and some verification is lacked. A local attacker can trick a victim to load malicious application and gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.
References
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-02-smartphone-en
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-02-phone-en
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200617-01-smartphone-en
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200701-02-smartphone-en
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200708-02-smartphone-en