This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Product Name |
Affected Version |
Resolved Product and Version |
Honor 6/ Honor 6 Plus/ Honor 7 |
Versions earlier than 6.9.16 |
6.9.16[1] |
[1] The product user who submits the upgrade application in huawei club website (https://www.wenjuan.com/s/YBNzIj/) will receive a system update prompt, install the update can fix the vulnerability.
Base Score: 6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C)
Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades. For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/psirt/report-vulnerabilities.
This vulnerability was first reported to Huawei PSIRT by Zhao Jianqiang and Chen Gengjia from 360 IceSword Lab, WangQize in ADLab of Venustech and Zhu Bin from VPP Security Team and Pan Yu from 360 Vulpecker Team also reported the problem to Huawei PSIRT later. Huawei would like to thank Zhao Jianqiang, Chen Gengjia, Wang Qize, Zhu Bin and Pan Yu for working with us and coordinated vulnerability disclosure to protect our customers.
2016-11-23 V1.1 UPDATE Updated the Summary and CVSS Score
2016-10-26 V1.0 INITIAL
None
Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism.
To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.
To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.