Huawei

Columbia-l29d Firmware

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 27.04.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:44:42

There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing th...

  • EPSS 0.06%
  • Veröffentlicht 27.04.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:44:42

There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing th...

Warnung
  • EPSS 0.74%
  • Veröffentlicht 10.03.2020 20:15:21
  • Zuletzt bearbeitet 04.04.2025 13:01:47

In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution...

  • EPSS 0.25%
  • Veröffentlicht 14.12.2019 00:15:10
  • Zuletzt bearbeitet 21.11.2024 04:44:34

Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.

Warnung Exploit
  • EPSS 49.83%
  • Veröffentlicht 11.10.2019 19:15:10
  • Zuletzt bearbeitet 04.04.2025 15:40:44

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local appli...

  • EPSS 3.04%
  • Veröffentlicht 14.08.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:51:45

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...