Huawei HiWallet App with the versions before 8.0.4 has an arbitrary lock pattern change vulnerability. It needs to verify the user's Huawei ID during lock pattern change. An attacker with root privilege who gets a user's smart phone may bypass Huawei ID verification by special operation. Successful exploit of this vulnerability can allow an attacker to change the lock pattern of HiWallet.
References
Link | Resource |
---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-01-hiwallet-en | Vendor Advisory |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-01-hiwallet-en | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-01-hiwallet-en - Vendor Advisory |
Information
Published : 2018-03-09 17:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-17149
Mitre link : CVE-2017-17149
CVE.ORG link : CVE-2017-17149
JSON object : View
Products Affected
huawei
- hiwallet
CWE