Vulnerability identifier: #VU54505
Vulnerability risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Huawei Mate 20
Client/Desktop applications /
Multimedia software
Huawei Mate 20 Pro
Client/Desktop applications /
Multimedia software
Hima-L29C
Hardware solutions /
Firmware
Laya-AL00EP
Hardware solutions /
Firmware
OxfordS-AN00A
Hardware solutions /
Firmware
Huawei Tony-AL00B
Hardware solutions /
Firmware
Vendor: Huawei
Description
The vulnerability allows a local attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. An attacker with physical access can connect to the smartphone through a USB cable and access a location that is outside of the restricted directory by a crafted filename
Mitigation
Install update from vendor's website.
Vulnerable software versions
Huawei Mate 20: 9.0.0.195(C01E195R2P1) - 9.1.0.139(C00E133R3P1)
Huawei Mate 20 Pro: 9.0.0.187(C432E10R1P16) - 9.0.0.278(C185E10R2P1)
Hima-L29C: 9.0.0.105(C10E9R1P16) - 9.0.0.105(C636E9R1P16)
Laya-AL00EP: 9.1.0.139(C786E133R3P1)
OxfordS-AN00A: 10.1.0.223(C00E210R5P1)
Huawei Tony-AL00B: 9.1.0.257(C00E222R2P1)
External links
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.