OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md | Third Party Advisory |
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
References | () https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md - Third Party Advisory |
Information
Published : 2022-10-14 15:16
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42463
Mitre link : CVE-2022-42463
CVE.ORG link : CVE-2022-42463
JSON object : View
Products Affected
openharmony
- openharmony
CWE
CWE-287
Improper Authentication