Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "504F2E73-FFD0-4589-8644-FE77656BB28D", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "66AC7F91-917C-40A6-9983-A339EFB091F1", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7FF0AD1-22C2-423B-822A-E6496CEDAB02", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B701EC6-8208-4D22-95A6-B07D471A8A8B", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A4346-1757-48F9-827C-13EABC357302", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFAE846A-00EA-417F-B66F-1F5396BB6139", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B655712B-E86C-4BD2-8A99-AEA382C520E7", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6066FAB-23F5-4CB2-B89E-B00F8835AC39", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de error de b\u00fafer de la memoria en la interfaz de un componente del Smartphone Huawei. Los atacantes locales pueden explotar esta vulnerabilidad para causar p\u00e9rdidas de la memoria y ataques de denegaci\u00f3n de servicio mediante la construcci\u00f3n cuidadosa de escenarios de ataque."}], "id": "CVE-2020-9146", "lastModified": "2024-11-21T05:40:08.003", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-04-01T18:15:12.293", "references": [{"source": "psirt@huawei.com", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"}], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-772"}], "source": "nvd@nist.gov", "type": "Primary"}]}