ID

VAR-202101-0997


CVE

CVE-2020-9209


TITLE

SMC2.0  Vulnerability in Microsoft

Trust: 0.8

sources: JVNDB: JVNDB-2020-015377

DESCRIPTION

There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products. SMC2.0 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Mate 30 is a smart phone of China's Huawei (Huawei) company. Huawei Mate 30 has a buffer overflow vulnerability, which can be exploited by attackers by sending carefully crafted packets with specific parameters to the target device. Due to insufficient verification of the parameters, a successful attack may cause abnormal device behavior

Trust: 2.25

sources: NVD: CVE-2020-9209 // JVNDB: JVNDB-2020-015377 // CNVD: CNVD-2021-05397 // VULMON: CVE-2020-9209

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-05397

AFFECTED PRODUCTS

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spcc00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc601

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc800

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc500

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r019c10

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c00spc700

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spce00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spcb00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r019c00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c00spc800

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spcd00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc600

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc602

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spca00

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion:v600r006c10spc700

Trust: 1.0

vendor:huaweimodel:smc2.0scope:eqversion: -

Trust: 0.8

vendor:huaweimodel:smc2.0scope: - version: -

Trust: 0.8

vendor:huaweimodel:smc2.0scope:eqversion:smc2.0 firmware

Trust: 0.8

vendor:huaweimodel:matescope:eqversion:30

Trust: 0.6

sources: CNVD: CNVD-2021-05397 // JVNDB: JVNDB-2020-015377 // NVD: CVE-2020-9209

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9209
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-9209
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-05397
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202012-1884
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-9209
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9209
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-05397
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-9209
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-9209
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-05397 // VULMON: CVE-2020-9209 // JVNDB: JVNDB-2020-015377 // CNNVD: CNNVD-202012-1884 // NVD: CVE-2020-9209

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.0

problemtype:Lack of authentication (CWE-862) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015377 // NVD: CVE-2020-9209

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202012-1884

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202012-1884

PATCH

title:huawei-sa-20201230-01-peurl:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en

Trust: 0.8

title:Patch for Huawei Mate 30 buffer overflow vulnerability (CNVD-2021-05397)url:https://www.cnvd.org.cn/patchInfo/show/245158

Trust: 0.6

sources: CNVD: CNVD-2021-05397 // JVNDB: JVNDB-2020-015377

EXTERNAL IDS

db:NVDid:CVE-2020-9209

Trust: 3.1

db:JVNDBid:JVNDB-2020-015377

Trust: 0.8

db:CNVDid:CNVD-2021-05397

Trust: 0.6

db:CNNVDid:CNNVD-202012-1884

Trust: 0.6

db:VULMONid:CVE-2020-9209

Trust: 0.1

sources: CNVD: CNVD-2021-05397 // VULMON: CVE-2020-9209 // JVNDB: JVNDB-2020-015377 // CNNVD: CNNVD-202012-1884 // NVD: CVE-2020-9209

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-9209

Trust: 2.0

url:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en

Trust: 1.7

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20201230-01-pe-cn

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-05397 // VULMON: CVE-2020-9209 // JVNDB: JVNDB-2020-015377 // CNNVD: CNNVD-202012-1884 // NVD: CVE-2020-9209

SOURCES

db:CNVDid:CNVD-2021-05397
db:VULMONid:CVE-2020-9209
db:JVNDBid:JVNDB-2020-015377
db:CNNVDid:CNNVD-202012-1884
db:NVDid:CVE-2020-9209

LAST UPDATE DATE

2024-11-23T22:05:17.115000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-05397date:2021-01-23T00:00:00
db:VULMONid:CVE-2020-9209date:2021-01-19T00:00:00
db:JVNDBid:JVNDB-2020-015377date:2021-09-17T07:58:00
db:CNNVDid:CNNVD-202012-1884date:2021-01-21T00:00:00
db:NVDid:CVE-2020-9209date:2024-11-21T05:40:10.383

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-05397date:2021-01-22T00:00:00
db:VULMONid:CVE-2020-9209date:2021-01-13T00:00:00
db:JVNDBid:JVNDB-2020-015377date:2021-09-17T00:00:00
db:CNNVDid:CNNVD-202012-1884date:2020-12-30T00:00:00
db:NVDid:CVE-2020-9209date:2021-01-13T23:15:13.807