Latest

Security Advisory – Directory Traversal Vulnerability in Huawei Smart Phone

By   /  April 26, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Directory Traversal Vulnerability in Huawei Smart Phone

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Directory Traversal Vulnerability in Huawei Smart Phone There is a directory traversal vulnerability in Huawei smart phone. The attacker can trick a user into installing the malicious APP and change a specific URI to an arbitrary directory. Eventually the attacker can obtain the files in […]

Read More →
Latest

Security Advisory – Brute-force attack of Users’ Safe Password in the Files APP in Huawei Mobile Phones

By   /  April 26, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Brute-force attack of Users’ Safe Password in the Files APP in Huawei Mobile Phones

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Brute-force attack of Users’ Safe Password in the Files APP in Huawei Mobile Phones The Files APP in some Huawei mobile phones has a brute-force password cracking vulnerability due to the improper design of the Safe key database. An unauthorized attacker could access sensitive database […]

Read More →
Latest

Security Advisory – Buffer Overflow vulnerability in the GaussDB

By   /  April 21, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Buffer Overflow vulnerability in the GaussDB

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Buffer Overflow vulnerability in the GaussDB The GaussDB has a buffer overflow vulnerability due to the lack of input validation on some parameters. An authenticated attacker on the LAN can exploit this vulnerability to execute arbitrary code or cause a denial of service (DoS) condition […]

Read More →
Latest

Security Advisory – Insufficient Input Validation Vulnerability in Some Huawei Products

By   /  April 19, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Insufficient Input Validation Vulnerability in Some Huawei Products

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Insufficient Input Validation Vulnerability in Some Huawei Products Some Huawei products have an insufficient input validation vulnerability. An unauthenticated attacker could send a forged air interface message to an affected product through a rogue base station. Due to insufficient input validation, the attacker could exploit […]

Read More →
Latest

Security Notice – Statement on Command Injection Vulnerability in Huawei HG532n Product

By   /  April 19, 2017  /  Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Notice – Statement on Command Injection Vulnerability in Huawei HG532n Product

MIL OSI Economics – Source: Huawei Headline: Security Notice – Statement on Command Injection Vulnerability in Huawei HG532n Product Huawei noticed that on April 17, 2017, security researcher Ahmed S. Darwish disclosed command injection vulnerability regarding Huawei HG532n on Packet Storm Website. Huawei immediately launched an investigation. The investigation is complete. Huawei has fixed the vulnerability mentioned […]

Read More →
Latest

Security Notice – Statement on Vulnerabilities in Huawei Products Mentioned by Weinmann at the Infiltrate Conference

By   /  April 8, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Notice – Statement on Vulnerabilities in Huawei Products Mentioned by Weinmann at the Infiltrate Conference

MIL OSI Economics – Source: Huawei Headline: Security Notice – Statement on Vulnerabilities in Huawei Products Mentioned by Weinmann at the Infiltrate Conference Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism. To enjoy Huawei PSIRT […]

Read More →
Latest

Security Advisory – Multiple Buffer Overflow Vulnerabilities in Bastet of Huawei Smart Phone

By   /  April 5, 2017  /  Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Multiple Buffer Overflow Vulnerabilities in Bastet of Huawei Smart Phone

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Multiple Buffer Overflow Vulnerabilities in Bastet of Huawei Smart Phone The Bastet of some Huawei mobile phones have three buffer overflow vulnerabilities due to the lack of parameter validation. An attacker with the root privilege of an Android system may trick a user into installing […]

Read More →
Latest

Security Advisory – Several Vulnerabilities on the VCM5010

By   /  March 30, 2017  /  Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Several Vulnerabilities on the VCM5010

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Several Vulnerabilities on the VCM5010 There is a command injection vulnerability on the VCM5010. This is due to insufficient validation of user’s input. An authenticated attacker could launch a command injection attack. (Vulnerability ID: HWPSIRT-2016-12094) This vulnerability has been assigned a Common Vulnerabilities and Exposures […]

Read More →
Latest

Security Advisory – Bluetooth Unlock Bypassing Vulnerability in Some Huawei Mobile Phones

By   /  March 23, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – Bluetooth Unlock Bypassing Vulnerability in Some Huawei Mobile Phones

MIL OSI Economics – Source: Huawei Headline: Security Advisory – Bluetooth Unlock Bypassing Vulnerability in Some Huawei Mobile Phones Some Huawei mobile phones have a Bluetooth unlock bypassing vulnerability due to the lack of validation on Bluetooth devices. If a user has enabled the smart unlock function, an attacker can impersonate the user’s Bluetooth device […]

Read More →
Latest

Security Advisory – DoS Vulnerability in Vibrator Service of Huawei Smart Phones

By   /  March 16, 2017  /  Banking and Finance, Business, Computer Technologies, Consumer Goods, Economics, Electronics, English, Financial Results, Global Economy, Huawei, MIL OSI, MIL OSI Economics, Open Source Intel, Technology, Telcos, Telecommunications  /  Comments Off on Security Advisory – DoS Vulnerability in Vibrator Service of Huawei Smart Phones

MIL OSI Economics – Source: Huawei Headline: Security Advisory – DoS Vulnerability in Vibrator Service of Huawei Smart Phones The vibrator service of some Huawei smart phones has DoS vulnerability due to the lack of a parameters check. An attacker can tricks a user into installing a malicious application on the smart phone, and send […]

Read More →