CVE-2023-37245

Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:11

Type Values Removed Values Added
References () https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory () https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory
References () https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory () https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory

12 Jul 2023, 17:26

Type Values Removed Values Added
CPE cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*
cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-120
References (MISC) https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - (MISC) https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 - Vendor Advisory
References (MISC) https://consumer.huawei.com/en/support/bulletin/2023/7/ - (MISC) https://consumer.huawei.com/en/support/bulletin/2023/7/ - Vendor Advisory
First Time Huawei
Huawei emui
Huawei harmonyos

06 Jul 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-06 13:15

Updated : 2024-11-21 08:11


NVD link : CVE-2023-37245

Mitre link : CVE-2023-37245

CVE.ORG link : CVE-2023-37245


JSON object : View

Products Affected

huawei

  • emui
  • harmonyos
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')