Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "940801A5-523C-40D6-BB43-25BC78ADDE61", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E6D0F53-9E85-4877-B558-4F5FB1F865D3", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "504F2E73-FFD0-4589-8644-FE77656BB28D", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "66AC7F91-917C-40A6-9983-A339EFB091F1", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7FF0AD1-22C2-423B-822A-E6496CEDAB02", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "49E5FFC0-53B4-4A34-8A23-BC70AA565703", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A4346-1757-48F9-827C-13EABC357302", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFAE846A-00EA-417F-B66F-1F5396BB6139", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B655712B-E86C-4BD2-8A99-AEA382C520E7", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en algunos tel\u00e9fonos inteligentes Huawei. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede causar excepciones en el proceso durante la actualizaci\u00f3n."}], "id": "CVE-2020-9138", "lastModified": "2024-11-21T05:40:06.840", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-01-13T22:15:13.880", "references": [{"source": "psirt@huawei.com", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/"}], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-787"}], "source": "nvd@nist.gov", "type": "Primary"}]}