Huawei Tony-TL00B Firmware 9.1.0.206(C01E200R2P3)

CPE Details

Huawei Tony-TL00B Firmware 9.1.0.206(C01E200R2P3)
9.1.0.206\(c01e200r2p3\)
2020-01-05
14h35 +00:00
2020-01-05
14h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:huawei:tony-tl00b_firmware:9.1.0.206\(c01e200r2p3\):*:*:*:*:*:*:*

Informations

Vendor

huawei

Product

tony-tl00b_firmware

Version

9.1.0.206\(c01e200r2p3\)

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-9109 2020-10-12 11h39 +00:00 There is an information disclosure vulnerability in several smartphones. The device does not sufficiently validate the identity of smart wearable device in certain specific scenario, the attacker need to gain certain information in the victim's smartphone to launch the attack, and successful exploit could cause information disclosure.Affected product versions include:HUAWEI Mate 20 versions earlier than 10.1.0.160(C00E160R3P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI Mate 20 X versions earlier than 10.1.0.160(C00E160R2P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8);Laya-AL00EP versions earlier than 10.1.0.160(C786E160R3P8);Tony-AL00B versions earlier than 10.1.0.160(C00E160R2P11);Tony-TL00B versions earlier than 10.1.0.160(C01E160R2P11).
4.6
Medium
CVE-2020-0069 2020-03-10 19h56 +00:00 In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
7.8
High
CVE-2019-5235 2019-12-13 22h09 +00:00 Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
5.3
Medium
CVE-2019-2215 2019-10-11 18h16 +00:00 A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
7.8
High