
CVE-2024-36499
https://notcve.org/view.php?id=CVE-2024-36499
14 Jun 2024 — Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de captura de pantalla no autorizada en el módulo WMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-269: Improper Privilege Management •

CVE-2023-52721
https://notcve.org/view.php?id=CVE-2023-52721
11 May 2024 — The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality. El módulo WindowManager tiene una vulnerabilidad en el control de permisos. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad. The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2024-4046
https://notcve.org/view.php?id=CVE-2024-4046
11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVE-2024-32999
https://notcve.org/view.php?id=CVE-2024-32999
11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVE-2024-32998
https://notcve.org/view.php?id=CVE-2024-32998
11 May 2024 — NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de acceso al puntero NULL en el módulo de reloj Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-824: Access of Uninitialized Pointer •

CVE-2023-52720
https://notcve.org/view.php?id=CVE-2023-52720
11 May 2024 — Race condition vulnerability in the soundtrigger module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo de activación de sonido Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the soundtrigger module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2024-32997
https://notcve.org/view.php?id=CVE-2024-32997
11 May 2024 — Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo del controlador de carpeta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2024-32996
https://notcve.org/view.php?id=CVE-2024-32996
11 May 2024 — Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escalada de privilegios en el módulo de cuenta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2024-32995
https://notcve.org/view.php?id=CVE-2024-32995
11 May 2024 — Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de denegación de servicio (DoS) en el módulo AMS Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-248: Uncaught Exception •

CVE-2023-52719
https://notcve.org/view.php?id=CVE-2023-52719
11 May 2024 — Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de escalada de privilegios en el módulo PMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-16: Configuration •