Versions
10.1.0.152(C00E136R7P2)
Versions earlier than 10.1.0.150(SP1C00E150R4P1)
Versions earlier than 10.1.0.156(C00E156R7P2)
10.0.0.182(C00E180R6P2)
Versions earlier than 10.1.0.150(C00E136R5P3)
10.1.0.126(C00E125R5P3)
Versions earlier than 10.0.0.189(C185E6R1P3)
Versions earlier than 10.1.0.156(C00E155R7P2)
Versions earlier than 10.1.0.126(C00E125R5P3)
Versions earlier than 10.1.0.160(C00E160R2P11)
10.0.0.203(C00E201R7P2)
Versions earlier than 10.1.0.159(C00E159R7P2)
Recent CVEs
CVE-2021-22364
There is a denial of service vulnerability in the versions 10.1.0.126(C00E125R5P3) of HUAWEI Mate 30 and 10.1.0.152(C00E136R7P2) of HUAWEI Mate 30 (5G) . A module does not verify certain parameters sufficiently and it leads to some exceptions. Successful exploit could cause a denial of service condition.
CVE-2021-22305
There is a buffer overflow vulnerability in Mate 30 10.1.0.126(C00E125R5P3). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause buffer overflow, compromising normal service.
CVE-2021-22306
There is an out-of-bound read vulnerability in Mate 30 10.0.0.182(C00E180R6P2). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause out-of-bound, compromising normal service.
CVE-2021-22307
There is a weak algorithm vulnerability in Mate 3010.0.0.203(C00E201R7P2). The protection is insufficient for the modules that should be protected. Local attackers can exploit this vulnerability to affect the integrity of certain module.
CVE-2021-22301
Mate 30 10.0.0.203(C00E201R7P2) have a buffer overflow vulnerability. After obtaining the root permission, an attacker can exploit the vulnerability to cause buffer overflow.
CVE-2020-9119
There is a privilege escalation vulnerability on some Huawei smart phones due to design defects. The attacker needs to physically contact the mobile phone and obtain higher privileges, and execute relevant commands, resulting in the user's privilege promotion.