Vulnerabilities (CVE)

Filtered by vendor Huawei Subscribe
Total 1774 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-22386 1 Huawei 2 Emui, Magic Ui 2024-02-04 6.9 MEDIUM 7.0 HIGH
A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges.
CVE-2021-22325 1 Huawei 2 Emui, Magic Ui 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission.
CVE-2021-22348 1 Huawei 2 Emui, Magic Ui 2024-02-04 7.5 HIGH 9.8 CRITICAL
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute.
CVE-2021-22378 1 Huawei 2 Ecns280 Td, Ecns280 Td Firmware 2024-02-04 3.5 LOW 5.3 MEDIUM
There is a race condition vulnerability in eCNS280_TD V100R005C00 and V100R005C10. There is a timing window exists in which the database can be operated by another thread that is operating concurrently. Successful exploit may cause the affected device abnormal.
CVE-2021-22344 1 Huawei 2 Emui, Magic Ui 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
CVE-2021-22339 1 Huawei 1 Manageone 2024-02-04 3.5 LOW 6.5 MEDIUM
There is a denial of service vulnerability in some versions of ManageOne. In specific scenarios, due to the insufficient verification of the parameter, an attacker may craft some specific parameter. Successful exploit may cause some services abnormal.
CVE-2021-22445 1 Huawei 2 Emui, Magic Ui 2024-02-04 7.8 HIGH 7.5 HIGH
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset.
CVE-2021-22359 1 Huawei 4 S5700, S5700 Firmware, S6700 and 1 more 2024-02-04 7.8 HIGH 7.5 HIGH
There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal.
CVE-2021-22347 1 Huawei 2 Emui, Magic Ui 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS.
CVE-2021-22392 1 Huawei 2 Emui, Magic Ui 2024-02-04 5.0 MEDIUM 7.5 HIGH
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses.
CVE-2021-22308 1 Huawei 2 Emui, Magic Ui 2024-02-04 2.1 LOW 3.3 LOW
There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage.
CVE-2021-22449 1 Huawei 1 Elf-g10hn 2024-02-04 5.0 MEDIUM 7.5 HIGH
There is a logic vulnerability in Elf-G10HN 1.0.0.608. An unauthenticated attacker could perform specific operations to exploit this vulnerability. Due to insufficient security design, successful exploit could allow an attacker to add users to be friends without prompting in the target device.
CVE-2021-22357 1 Huawei 8 S12700, S12700 Firmware, S5700 and 5 more 2024-02-04 5.0 MEDIUM 7.5 HIGH
There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500.
CVE-2020-9149 1 Huawei 2 Emui, Magic Ui 2024-02-04 2.1 LOW 5.5 MEDIUM
An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages.
CVE-2021-22420 1 Huawei 1 Harmonyos 2024-02-04 7.2 HIGH 7.8 HIGH
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing..
CVE-2021-22422 1 Huawei 1 Harmonyos 2024-02-04 7.2 HIGH 7.8 HIGH
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting.
CVE-2021-22343 1 Huawei 2 Emui, Magic Ui 2024-02-04 6.4 MEDIUM 9.1 CRITICAL
There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability.
CVE-2021-22311 1 Huawei 1 Manageone 2024-02-04 6.5 MEDIUM 7.2 HIGH
There is an improper permission assignment vulnerability in Huawei ManageOne product. Due to improper security hardening, the process can run with a higher privilege. Successful exploit could allow certain users to do certain operations with improper permissions. Affected product versions include: ManageOne versions 8.0.0, 8.0.1.
CVE-2020-9108 1 Huawei 2 P30 Pro, P30 Pro Firmware 2024-02-04 7.1 HIGH 5.5 MEDIUM
HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have an out-of-bounds read and write vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the process reboot.
CVE-2020-9206 1 Huawei 2 Eudc660, Eudc660 Firmware 2024-02-04 4.6 MEDIUM 6.7 MEDIUM
The eUDC660 product has a resource management vulnerability. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the device, as a result, the key file can be obtained and data can be decrypted, affecting confidentiality, integrity, and availability of the device.