
CVE-2024-56455
https://notcve.org/view.php?id=CVE-2024-56455
08 Jan 2025 — Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56454
https://notcve.org/view.php?id=CVE-2024-56454
08 Jan 2025 — Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56453
https://notcve.org/view.php?id=CVE-2024-56453
08 Jan 2025 — Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56452
https://notcve.org/view.php?id=CVE-2024-56452
08 Jan 2025 — Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56451
https://notcve.org/view.php?id=CVE-2024-56451
08 Jan 2025 — Integer overflow vulnerability during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. Integer overflow vulnerability during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-680: Integer Overflow to Buffer Overflow •

CVE-2024-56446
https://notcve.org/view.php?id=CVE-2024-56446
08 Jan 2025 — Vulnerability of variables not being initialized in the notification module Impact: Successful exploitation of this vulnerability may affect availability. Vulnerability of variables not being initialized in the notification module Impact: Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-457: Use of Uninitialized Variable •

CVE-2024-56445
https://notcve.org/view.php?id=CVE-2024-56445
08 Jan 2025 — Instruction authentication bypass vulnerability in the Findnetwork module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. Instruction authentication bypass vulnerability in the Findnetwork module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-287: Improper Authentication •

CVE-2024-56444
https://notcve.org/view.php?id=CVE-2024-56444
08 Jan 2025 — Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2024-56443
https://notcve.org/view.php?id=CVE-2024-56443
08 Jan 2025 — Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-54120
https://notcve.org/view.php?id=CVE-2024-54120
08 Jan 2025 — Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. • https://consumer.huawei.com/en/support/bulletin/2025/1 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •