CVE-2023-37242

Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:11

Type Values Removed Values Added
References () https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory () https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory
References () https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory () https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory

12 Jul 2023, 17:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - (MISC) https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory
References (MISC) https://consumer.huawei.com/en/support/bulletin/2023/7/ - (MISC) https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory
CWE CWE-639
CPE cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*
First Time Huawei
Huawei emui
Huawei harmonyos

06 Jul 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-06 13:15

Updated : 2024-11-21 08:11


NVD link : CVE-2023-37242

Mitre link : CVE-2023-37242

CVE.ORG link : CVE-2023-37242


JSON object : View

Products Affected

huawei

  • emui
  • harmonyos
CWE
CWE-639

Authorization Bypass Through User-Controlled Key