cnvd-2020-36736
Vulnerability from cnvd
Title: 多款Huawei产品信息泄露漏洞(CNVD-2020-36736)
Description:
Huawei Mate 9等都是中国华为(Huawei)公司的产品。Huawei Mate 9是一款智能手机。Huawei Mate 10是华为(Huawei)公司的一款智能手机产品。Honor 9 Lite是一款智能手机。
多款Huawei产品中存在信息泄露漏洞,该漏洞源于系统在某极少出现的特定场景下对设置了应用锁的应用信息处理不当。攻击者可利用该漏洞泄露信息。
Severity: 低
Patch Name: 多款Huawei产品信息泄露漏洞(CNVD-2020-36736)的补丁
Patch Description:
Huawei Mate 9等都是中国华为(Huawei)公司的产品。Huawei Mate 9是一款智能手机。Huawei Mate 10是华为(Huawei)公司的一款智能手机产品。Honor 9 Lite是一款智能手机。
多款Huawei产品中存在信息泄露漏洞,该漏洞源于系统在某极少出现的特定场景下对设置了应用锁的应用信息处理不当。攻击者可利用该漏洞泄露信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191211-01-smartphone-cn
Reference: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191211-01-smartphone-cn
Name | ['Huawei Mate 10 Pro <9.0.0.167(C00E87R2P15T8)', 'Huawei Mate 10 Pro <9.0.0.159(C185E2R1P13T8)', 'Huawei Mate 10 Pro <9.0.0.161(C432E4R1P11T8)', 'Huawei Mate 10 Pro <9.0.0.159(C636E2R1P13T8)', 'Huawei Honor V10 <9.0.0.156(C00E156R2P14T8)', 'Huawei Honor V10 <9.0.0.159(C432E4R1P9T8)', 'Huawei Honor V10 <9.0.0.159(C636E3R1P12T8)', 'Huawei Changxiang 7S <9.1.0.107(C00E107R2P8T8)', 'Huawei P-smart <9.1.0.119(C636E5R1P1T8)', 'Huawei P-smart <9.1.0.130(C432E8R1P5T8)', 'Huawei Changxiang <=9.1.0.111(C00E111R1P6T8)', 'Huawei Y9 2018 <9.1.0.115(C432E5R1P1T8)', 'Huawei Y9 2018 <9.1.0.120(C636E5R1P1T8)', 'Huawei Honor 9 Lite <9.1.0.113(C00E111R2P10T8)', 'Huawei Honor 9 Lite <9.1.0.118(C636E4R1P1T8)', 'Huawei Honor 9 Lite <9.1.0.118(C185E4R1P4T8)', 'Huawei Honor 9 Lite <9.1.0.121(C432E4R1P3T8)', 'Huawei Honor 9i <9.1.0.112(C00E112R1P6T8)', 'Huawei Honor 9i <9.1.0.106(SP53C636E2R1P4T8)', 'Huawei Mate 9 <9.0.1.158(C432E6R1P8T8)', 'Huawei Mate 9 <9.0.1.159(C636E6R1P8T8)', 'Huawei Mate 10 <9.0.0.167(C00E85R2P20T8)', 'Huawei Mate 10 <9.0.0.159(C432E4R1P9T8)', 'Huawei Mate 10 <9.0.0.177(C185E2R1P12T8)', 'Huawei Mate 10 <9.0.0.159(C636E2R1P12T8)'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-5264", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-5264" } }, "description": "Huawei Mate 9\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei Mate 9\u662f\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002Huawei Mate 10\u662f\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u4ea7\u54c1\u3002Honor 9 Lite\u662f\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002\n\n\u591a\u6b3eHuawei\u4ea7\u54c1\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7cfb\u7edf\u5728\u67d0\u6781\u5c11\u51fa\u73b0\u7684\u7279\u5b9a\u573a\u666f\u4e0b\u5bf9\u8bbe\u7f6e\u4e86\u5e94\u7528\u9501\u7684\u5e94\u7528\u4fe1\u606f\u5904\u7406\u4e0d\u5f53\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191211-01-smartphone-cn", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-36736", "openTime": "2020-07-07", "patchDescription": "Huawei Mate 9\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei Mate 9\u662f\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002Huawei Mate 10\u662f\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u4ea7\u54c1\u3002Honor 9 Lite\u662f\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7cfb\u7edf\u5728\u67d0\u6781\u5c11\u51fa\u73b0\u7684\u7279\u5b9a\u573a\u666f\u4e0b\u5bf9\u8bbe\u7f6e\u4e86\u5e94\u7528\u9501\u7684\u5e94\u7528\u4fe1\u606f\u5904\u7406\u4e0d\u5f53\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2020-36736\uff09\u7684\u8865\u4e01", "products": { "product": [ "Huawei Mate 10 Pro \u003c9.0.0.167(C00E87R2P15T8)", "Huawei Mate 10 Pro \u003c9.0.0.159(C185E2R1P13T8)", "Huawei Mate 10 Pro \u003c9.0.0.161(C432E4R1P11T8)", "Huawei Mate 10 Pro \u003c9.0.0.159(C636E2R1P13T8)", "Huawei Honor V10 \u003c9.0.0.156(C00E156R2P14T8)", "Huawei Honor V10 \u003c9.0.0.159(C432E4R1P9T8)", "Huawei Honor V10 \u003c9.0.0.159(C636E3R1P12T8)", "Huawei Changxiang 7S \u003c9.1.0.107(C00E107R2P8T8)", "Huawei P-smart \u003c9.1.0.119(C636E5R1P1T8)", "Huawei P-smart \u003c9.1.0.130(C432E8R1P5T8)", "Huawei Changxiang \u003c=9.1.0.111(C00E111R1P6T8)", "Huawei Y9 2018 \u003c9.1.0.115(C432E5R1P1T8)", "Huawei Y9 2018 \u003c9.1.0.120(C636E5R1P1T8)", "Huawei Honor 9 Lite \u003c9.1.0.113(C00E111R2P10T8)", "Huawei Honor 9 Lite \u003c9.1.0.118(C636E4R1P1T8)", "Huawei Honor 9 Lite \u003c9.1.0.118(C185E4R1P4T8)", "Huawei Honor 9 Lite \u003c9.1.0.121(C432E4R1P3T8)", "Huawei Honor 9i \u003c9.1.0.112(C00E112R1P6T8)", "Huawei Honor 9i \u003c9.1.0.106(SP53C636E2R1P4T8)", "Huawei Mate 9 \u003c9.0.1.158(C432E6R1P8T8)", "Huawei Mate 9 \u003c9.0.1.159(C636E6R1P8T8)", "Huawei Mate 10 \u003c9.0.0.167(C00E85R2P20T8)", "Huawei Mate 10 \u003c9.0.0.159(C432E4R1P9T8)", "Huawei Mate 10 \u003c9.0.0.177(C185E2R1P12T8)", "Huawei Mate 10 \u003c9.0.0.159(C636E2R1P12T8)" ] }, "referenceLink": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191211-01-smartphone-cn", "serverity": "\u4f4e", "submitTime": "2019-12-17", "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2020-36736\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.