CVE-2023-39398
https://notcve.org/view.php?id=CVE-2023-39398
Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization. • https://consumer.huawei.com/en/support/bulletin/2023/8 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 • CWE-275: Permission Issues CWE-285: Improper Authorization •
CVE-2023-39397
https://notcve.org/view.php?id=CVE-2023-39397
Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2023/8 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 • CWE-476: NULL Pointer Dereference •
CVE-2023-39395
https://notcve.org/view.php?id=CVE-2023-39395
Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2023/8 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 • CWE-19: Data Processing Errors •
CVE-2023-39394
https://notcve.org/view.php?id=CVE-2023-39394
Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified. • https://consumer.huawei.com/en/support/bulletin/2023/8 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2023-39391
https://notcve.org/view.php?id=CVE-2023-39391
Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality. • https://consumer.huawei.com/en/support/bulletin/2023/8 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 • CWE-264: Permissions, Privileges, and Access Controls •