Multiple vulnerabilities in Huawei P30 Pro



Published: 2020-07-16 | Updated: 2020-07-22
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2020-9254
CVE-2020-9257
CWE-ID CWE-840
CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Huawei P30 Pro
Client/Desktop applications / Multimedia software

Vendor Huawei

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

Updated 22.07.2020
Added vulnerability #2

1) Business Logic Errors

EUVDB-ID: #VU30116

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9254

CWE-ID: CWE-840 - Business Logic Errors (3.0)

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target device.

The vulnerability exists due to a logic error when the software checking the size of certain parameter. A local attacker can trick a victim to install a malicious application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Huawei P30 Pro: before 10.1.0.160

External links

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-04-smartphone-en


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU31760

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9257

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A local attacker can trick a vicitm to install a malicious application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Huawei P30 Pro: before 10.1.0.160

External links

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-03-smartphone-en


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###