Vulnerabilities (CVE)

Filtered by vendor Huawei Subscribe
Filtered by product P10 Firmware
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-2725 1 Huawei 4 P10, P10 Firmware, P10 Plus and 1 more 2017-12-08 9.3 HIGH 7.8 HIGH
Bastet in P10 Plus and P10 smart phones with software earlier than VKY-AL00C00B123 versions, earlier than VTR-AL00C00B123 versions have a buffer overflow vulnerability. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. The APP can modify specific data to cause buffer overflow in the next system reboot, causing continuous system reboot or arbitrary code execution.
CVE-2017-2726 1 Huawei 4 P10, P10 Firmware, P10 Plus and 1 more 2017-12-08 9.3 HIGH 8.4 HIGH
Bastet in P10 Plus and P10 smart phones with software earlier than VKY-AL00C00B123 versions, earlier than VTR-AL00C00B123 versions have a buffer overflow vulnerability. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. The APP can modify specific data to cause buffer overflow in the next system reboot, causing continuous system reboot or arbitrary code execution.
CVE-2017-2724 1 Huawei 4 P10, P10 Firmware, P10 Plus and 1 more 2017-12-08 9.3 HIGH 8.4 HIGH
Bastet in P10 Plus and P10 smart phones with software earlier than VKY-AL00C00B123 versions, earlier than VTR-AL00C00B123 versions have a buffer overflow vulnerability. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. The APP can modify specific data to cause buffer overflow in the next system reboot, causing continuous system reboot or arbitrary code execution.
CVE-2017-8150 1 Huawei 8 P10, P10 Firmware, P10 Plus and 5 more 2017-12-08 9.3 HIGH 7.8 HIGH
The boot loaders of P10 and P10 Plus Huawei mobile phones with software the versions before Victoria-L09AC605B162, the versions before Victoria-L29AC605B162, the versions before Vicky-L29AC605B162 have an arbitrary memory write vulnerability due to the lack of parameter validation. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. The APP can modify specific data to cause arbitrary memory writing in the next system reboot, causing continuous system reboot or arbitrary code execution.