CVE-2020-9247
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
07/12/2020
Last modified:
08/12/2020
Description
There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:* | 10.1.0.230\(c432e9r5p1\) (excluding) | |
| cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:* | 10.1.0.160\(c00e160r3p8\) (excluding) | |
| cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:* | 10.1.0.270\(c432e7r1p5\) (excluding) | |
| cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:* | 10.1.0.160\(c00e160r2p8\) (excluding) | |
| cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:p30_firmware:9.1.0.272\(c635e4r2p2\):*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:* | 10.1.0.160\(c00e160r2p8\) (excluding) | |
| cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:hima-l29c_firmware:*:*:*:*:*:*:*:* | 10.1.0.273\(c185e5r2p4\) (excluding) | |
| cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:laya-al00ep_firmware:*:*:*:*:*:*:*:* | 10.1.0.160\(c786e160r3p8\) (excluding) |
To consult the complete list of CPE names with products and versions, see this page



