Vulnerabilities > Huawei > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-09 | CVE-2022-48289 | Missing Authentication for Critical Function vulnerability in Huawei Emui and Harmonyos The bundle management module lacks authentication and control mechanisms in some APIs. | 7.5 |
2023-02-09 | CVE-2022-48294 | Improper Authentication vulnerability in Huawei Emui and Harmonyos The IHwAttestationService interface has a defect in authentication. | 7.5 |
2023-02-09 | CVE-2022-48295 | Improper Preservation of Permissions vulnerability in Huawei Emui and Harmonyos The IHwAntiMalPlugin interface lacks permission verification. | 7.5 |
2023-02-09 | CVE-2022-48297 | Improper Validation of Specified Quantity in Input vulnerability in Huawei Emui and Harmonyos The geofencing kernel code has a vulnerability of not verifying the length of the input data. | 7.5 |
2023-02-09 | CVE-2022-48298 | Improper Validation of Specified Quantity in Input vulnerability in Huawei Emui and Harmonyos The geofencing kernel code does not verify the length of the input data. | 7.5 |
2023-02-09 | CVE-2022-48299 | Missing Authentication for Critical Function vulnerability in Huawei Emui and Harmonyos The WMS module lacks the authentication mechanism in some APIs. | 7.5 |
2023-02-09 | CVE-2022-48300 | Missing Authentication for Critical Function vulnerability in Huawei Emui and Harmonyos The WMS module lacks the authentication mechanism in some APIs. | 7.5 |
2023-02-09 | CVE-2022-48301 | Improper Preservation of Permissions vulnerability in Huawei Emui and Harmonyos The bundle management module lacks permission verification in some APIs. | 7.5 |
2023-02-09 | CVE-2022-48302 | Unspecified vulnerability in Huawei Emui and Harmonyos The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2023-01-06 | CVE-2021-46867 | Out-of-bounds Read vulnerability in Huawei Emui and Harmonyos The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. | 7.5 |