Huawei Magic Ui vulnerabilities
276 known vulnerabilities affecting huawei/magic_ui.
Total CVEs
276
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL64HIGH164MEDIUM46LOW2
Vulnerabilities
Page 5 of 14
CVE-2021-40058HIGHCVSS 7.5v3.1.0v3.1.12022-03-10
CVE-2021-40058 [HIGH] CWE-787 CVE-2021-40058: There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.
cvelistv5nvd
CVE-2021-40048HIGHCVSS 7.5v3.0.0v3.1.0+2 more2022-03-10
CVE-2021-40048 [HIGH] CWE-131 CVE-2021-40048: There is an incorrect buffer size calculation vulnerability in the video framework. Successful explo
There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability.
cvelistv5nvd
CVE-2021-40063HIGHCVSS 7.5v3.1.0v3.1.1+1 more2022-03-10
CVE-2021-40063 [HIGH] CVE-2021-40063: There is an improper access control vulnerability in the video module. Successful exploitation of th
There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality.
cvelistv5nvd
CVE-2021-40047HIGHCVSS 7.5v3.0.0v3.1.0+2 more2022-03-10
CVE-2021-40047 [HIGH] CWE-401 CVE-2021-40047: There is a vulnerability of memory not being released after effective lifetime in the Bastet module.
There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity.
cvelistv5nvd
CVE-2021-40055MEDIUMCVSS 5.9v3.0.0v3.1.0+2 more2022-03-10
CVE-2021-40055 [MEDIUM] CVE-2021-40055: There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Su
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity.
cvelistv5nvd
CVE-2021-40059MEDIUMCVSS 6.5v3.1.0v3.1.1+1 more2022-03-10
CVE-2021-40059 [MEDIUM] CWE-276 CVE-2021-40059: There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vul
There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality.
cvelistv5nvd
CVE-2021-22432CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22432 [CRITICAL] CWE-119 CVE-2021-22432: There is a vulnerability when configuring permission isolation in smartphones. Successful exploitati
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.
cvelistv5nvd
CVE-2021-22448CRITICALCVSS 9.1v2.1.1v3.0.0+3 more2022-02-25
CVE-2021-22448 [CRITICAL] CVE-2021-22448: There is an improper verification vulnerability in smartphones. Successful exploitation of this vuln
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.
cvelistv5nvd
CVE-2021-22394CRITICALCVSS 9.1v3.1.0v3.1.1+1 more2022-02-25
CVE-2021-22394 [CRITICAL] CWE-120 CVE-2021-22394: There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerabili
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration.
cvelistv5nvd
CVE-2021-22431CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22431 [CRITICAL] CWE-119 CVE-2021-22431: There is a vulnerability when configuring permission isolation in smartphones. Successful exploitati
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.
cvelistv5nvd
CVE-2021-22430CRITICALCVSS 9.8v2.1.1v3.0.0+3 more2022-02-25
CVE-2021-22430 [CRITICAL] CVE-2021-22430: There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection.
cvelistv5nvd
CVE-2021-22434CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22434 [CRITICAL] CWE-119 CVE-2021-22434: There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of thi
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.
cvelistv5nvd
CVE-2021-22426CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22426 [CRITICAL] CWE-119 CVE-2021-22426: There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerabilit
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.
cvelistv5nvd
CVE-2021-22429CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22429 [CRITICAL] CWE-119 CVE-2021-22429: There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerabilit
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.
cvelistv5nvd
CVE-2021-22433CRITICALCVSS 9.8v4.0.0v3.1.1+1 more2022-02-25
CVE-2021-22433 [CRITICAL] CWE-119 CVE-2021-22433: There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerabilit
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.
cvelistv5nvd
CVE-2021-22319HIGHCVSS 7.5v3.1.0v3.1.1+1 more2022-02-25
CVE-2021-22319 [HIGH] CWE-190 CVE-2021-22319: There is an improper verification vulnerability in smartphones. Successful exploitation of this vuln
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows.
cvelistv5nvd
CVE-2021-22395HIGHCVSS 7.5v3.1.0v3.1.1+1 more2022-02-25
CVE-2021-22395 [HIGH] CWE-94 CVE-2021-22395: There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerabilit
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.
cvelistv5nvd
CVE-2021-37027HIGHCVSS 7.5v2.1.1v3.0.0+3 more2022-02-25
CVE-2021-37027 [HIGH] CVE-2021-37027: There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affec
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity.
cvelistv5nvd
CVE-2021-22489HIGHCVSS 7.5v2.1.1v3.0.0+1 more2022-02-25
CVE-2021-22489 [HIGH] CVE-2021-22489: There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affec
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability.
cvelistv5nvd
CVE-2021-22437HIGHCVSS 7.0v3.1.0v3.1.12022-02-25
CVE-2021-22437 [HIGH] CWE-190 CVE-2021-22437: There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploi
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.
cvelistv5nvd