ID

VAR-202108-0282


CVE

CVE-2021-22418


TITLE

HarmonyOS  Integer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-009372

DESCRIPTION

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.8

sources: NVD: CVE-2021-22418 // JVNDB: JVNDB-2021-009372 // VULHUB: VHN-380853 // VULMON: CVE-2021-22418

AFFECTED PRODUCTS

vendor:huaweimodel:harmonyosscope:eqversion:2.0

Trust: 1.0

vendor:huaweimodel:harmonyosscope: - version: -

Trust: 0.8

vendor:huaweimodel:harmonyosscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-009372 // NVD: CVE-2021-22418

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-22418
value: HIGH

Trust: 1.0

NVD: CVE-2021-22418
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202108-324
value: HIGH

Trust: 0.6

VULHUB: VHN-380853
value: HIGH

Trust: 0.1

VULMON: CVE-2021-22418
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-22418
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-380853
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-22418
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-22418
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-380853 // VULMON: CVE-2021-22418 // JVNDB: JVNDB-2021-009372 // CNNVD: CNNVD-202108-324 // NVD: CVE-2021-22418

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.1

problemtype:Integer overflow or wraparound (CWE-190) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-380853 // JVNDB: JVNDB-2021-009372 // NVD: CVE-2021-22418

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202108-324

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202108-324

PATCH

title:Keisei Expectationsurl:https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077

Trust: 0.8

title:Huawei HarmonyOS Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159653

Trust: 0.6

sources: JVNDB: JVNDB-2021-009372 // CNNVD: CNNVD-202108-324

EXTERNAL IDS

db:NVDid:CVE-2021-22418

Trust: 3.4

db:JVNDBid:JVNDB-2021-009372

Trust: 0.8

db:CNNVDid:CNNVD-202108-324

Trust: 0.6

db:VULHUBid:VHN-380853

Trust: 0.1

db:VULMONid:CVE-2021-22418

Trust: 0.1

sources: VULHUB: VHN-380853 // VULMON: CVE-2021-22418 // JVNDB: JVNDB-2021-009372 // CNNVD: CNNVD-202108-324 // NVD: CVE-2021-22418

REFERENCES

url:https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-22418

Trust: 1.4

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/190.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-380853 // VULMON: CVE-2021-22418 // JVNDB: JVNDB-2021-009372 // CNNVD: CNNVD-202108-324 // NVD: CVE-2021-22418

SOURCES

db:VULHUBid:VHN-380853
db:VULMONid:CVE-2021-22418
db:JVNDBid:JVNDB-2021-009372
db:CNNVDid:CNNVD-202108-324
db:NVDid:CVE-2021-22418

LAST UPDATE DATE

2024-08-14T14:25:16.490000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-380853date:2021-08-11T00:00:00
db:VULMONid:CVE-2021-22418date:2021-08-11T00:00:00
db:JVNDBid:JVNDB-2021-009372date:2022-04-21T09:02:00
db:CNNVDid:CNNVD-202108-324date:2021-11-29T00:00:00
db:NVDid:CVE-2021-22418date:2021-08-11T13:25:01.420

SOURCES RELEASE DATE

db:VULHUBid:VHN-380853date:2021-08-03T00:00:00
db:VULMONid:CVE-2021-22418date:2021-08-03T00:00:00
db:JVNDBid:JVNDB-2021-009372date:2022-04-21T00:00:00
db:CNNVDid:CNNVD-202108-324date:2021-08-03T00:00:00
db:NVDid:CVE-2021-22418date:2021-08-03T18:15:08.050