Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "940801A5-523C-40D6-BB43-25BC78ADDE61", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "504F2E73-FFD0-4589-8644-FE77656BB28D", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "66AC7F91-917C-40A6-9983-A339EFB091F1", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7FF0AD1-22C2-423B-822A-E6496CEDAB02", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B701EC6-8208-4D22-95A6-B07D471A8A8B", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A4346-1757-48F9-827C-13EABC357302", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFAE846A-00EA-417F-B66F-1F5396BB6139", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B655712B-E86C-4BD2-8A99-AEA382C520E7", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6066FAB-23F5-4CB2-B89E-B00F8835AC39", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages."}, {"lang": "es", "value": "Se presenta una vulnerabilidad del mecanismo de omisi\u00f3n de aplicaciones en la interfaz de un componente del Smartphone Huawei. Los atacantes locales pueden explotar esta vulnerabilidad para eliminar los mensajes SMS de los usuarios."}], "id": "CVE-2020-9148", "lastModified": "2024-11-21T05:40:08.343", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-04-01T18:15:12.480", "references": [{"source": "psirt@huawei.com", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1"}], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}