5.3
MEDIUM
CVE-2019-5235
Huawei Smart Phone Null Pointer Dereference Remote Code Execution
Description

Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.

INFO

Published Date :

Dec. 14, 2019, 12:15 a.m.

Last Modified :

Nov. 21, 2024, 4:44 a.m.

Remotely Exploitable :

Yes !

Impact Score :

1.4

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2019-5235 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Huawei princeton-al10d_firmware
2 Huawei emily-al00a_firmware
3 Huawei elle-al00b_firmware
4 Huawei emily-tl00b_firmware
5 Huawei alp-al00b_firmware
6 Huawei columbia-al10b_firmware
7 Huawei columbia-l29d_firmware
8 Huawei ever-l29b_firmware
9 Huawei jackman-l22_firmware
10 Huawei hima-al00b_firmware
11 Huawei bla-al00b_firmware
12 Huawei bla-tl00b_firmware
13 Huawei columbia-al10i_firmware
14 Huawei columbia-tl00d_firmware
15 Huawei harry-al00c_firmware
16 Huawei harry-al10b_firmware
17 Huawei harry-tl00c_firmware
18 Huawei johnson-tl00d_firmware
19 Huawei johnson-tl00f_firmware
20 Huawei laya-al00ep_firmware
21 Huawei neo-al00d_firmware
22 Huawei potter-al00c_firmware
23 Huawei potter-al10a_firmware
24 Huawei princeton-al10b_firmware
25 Huawei princeton-tl10c_firmware
26 Huawei tony-al00b_firmware
27 Huawei tony-tl00b_firmware
28 Huawei alp-tl00b_firmware
29 Huawei charlotte-al00a_firmware
30 Huawei charlotte-tl00b_firmware
31 Huawei elle-tl00b_firmware
32 Huawei ever-al00b_firmware
33 Huawei jackman-l21_firmware
34 Huawei jackman-l23_firmware
35 Huawei johnson-al00ic_firmware
36 Huawei johnson-al10c_firmware
37 Huawei johnson-l21c_firmware
38 Huawei johnson-l21d_firmware
39 Huawei johnson-l22c_firmware
40 Huawei johnson-l22d_firmware
41 Huawei johnson-l23c_firmware
42 Huawei johnson-l42ic_firmware
43 Huawei johnson-l42ie_firmware
44 Huawei johnson-l42if_firmware
45 Huawei princeton-al10i_firmware
46 Huawei vogue-al00a_firmware
47 Huawei vogue-al00a-preload_firmware
48 Huawei vogue-al10c_firmware
49 Huawei vogue-al10c-preload_firmware
50 Huawei vogue-tl00b_firmware
51 Huawei alp-al00b
52 Huawei alp-tl00b
53 Huawei bla-al00b
54 Huawei bla-tl00b
55 Huawei columbia-l29d
56 Huawei johnson-tl00d
57 Huawei neo-al00d
58 Huawei princeton-al10b
59 Huawei tony-al00b
60 Huawei tony-tl00b
61 Huawei columbia-al10b
62 Huawei columbia-tl00d
63 Huawei emily-al00a
64 Huawei charlotte-al00a
65 Huawei hima-al00b
66 Huawei columbia-al10i
67 Huawei ever-l29b
68 Huawei harry-al00c
69 Huawei harry-al10b
70 Huawei harry-tl00c
71 Huawei johnson-tl00f
72 Huawei laya-al00ep
73 Huawei potter-al00c
74 Huawei potter-al10a
75 Huawei princeton-al10d
76 Huawei princeton-tl10c
77 Huawei elle-al00b
78 Huawei emily-tl00b
79 Huawei charlotte-tl00b
80 Huawei elle-tl00b
81 Huawei ever-al00b
82 Huawei jackman-l21
83 Huawei jackman-l22
84 Huawei jackman-l23
85 Huawei johnson-al00ic
86 Huawei johnson-al10c
87 Huawei johnson-l21c
88 Huawei johnson-l21d
89 Huawei johnson-l22c
90 Huawei johnson-l22d
91 Huawei johnson-l23c
92 Huawei johnson-l42ic
93 Huawei johnson-l42ie
94 Huawei johnson-l42if
95 Huawei princeton-al10i
96 Huawei vogue-al00a
97 Huawei vogue-al00a-preload
98 Huawei vogue-al10c
99 Huawei vogue-al10c-preload
100 Huawei vogue-tl00b
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-5235.

URL Resource
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en Vendor Advisory
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-5235 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-5235 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Dec. 23, 2019

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
    Changed Reference Type https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en No Types Assigned https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en Vendor Advisory
    Added CWE NIST CWE-476
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:alp-al00b_firmware:8.0.0.153\(c00\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:alp-tl00b_firmware:8.0.0.129\(sp2c01\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.129\(sp2c786\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.153\(c00\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:bla-tl00b_firmware:8.0.0.129\(sp2c01\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:charlotte-al00a_firmware:8.1.0.176\(c00\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:charlotte-al00a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:charlotte-tl00b_firmware:8.1.0.176\(c01\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:charlotte-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:columbia-al10b_firmware:8.1.0.163\(c00\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:columbia-al10i_firmware:8.1.0.150\(c675custc675d2\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.146\(c461\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.148\(c185\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\(c10\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\(c432\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:columbia-tl00d_firmware:8.1.0.186\(c01gt\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.162\(c00e160r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:elle-tl00b_firmware:9.1.0.162\(c01e160r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:elle-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:emily-al00a_firmware:8.1.0.190\(c00\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:emily-al00a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:emily-tl00b_firmware:8.1.0.175\(c01\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:emily-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ever-al00b_firmware:9.0.0.195\(c00e195r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ever-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.206\(c185e3r3p1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.207\(c636e3r2p1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.208\(c432e3r1p12\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:harry-al00c_firmware:9.1.0.206\(c00e205r3p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:* *cpe:2.3:o:huawei:harry-al10b_firmware:9.1.0.206\(c00e205r3p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:harry-tl00c_firmware:9.0.1.162\(c01e160r2p3\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:hima-al00b_firmware:9.0.0.200\(c00e200r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:hima-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:jackman-l21_firmware:8.2.0.160\(c185\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:jackman-l21:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:jackman-l22_firmware:8.2.0.156\(c636r2p2\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:jackman-l22:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.152\(c45custc45d1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.162\(c605\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:jackman-l23:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-al00ic_firmware:8.2.0.161\(c675custc675d1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-al00ic:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-al10c_firmware:8.2.0.165\(c00r1p16\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-al10c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.130\(c461r1p1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.131\(c10r2p2\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.136\(c432custc432d1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l21c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\(c10custc10d1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\(c432custc432d1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.131\(c55custc55d1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l21d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.105\(c185r1p1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.107\(c636r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l22c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.105\(c185r2p1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.107\(c636r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l22d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.130\(c636custc636d2\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.133\(c605custc605d1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l23c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l42ic_firmware:8.2.0.155\(c675r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l42ic:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l42ie_firmware:8.2.0.155\(c675r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l42ie:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-l42if_firmware:8.2.0.155\(c675r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-l42if:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.100\(c541custc541d1\):*:*:*:*:*:*:* *cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.165\(c01r1p16\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:johnson-tl00f_firmware:8.2.0.100\(c541custc541d1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:laya-al00ep_firmware:9.0.0.201\(c786e200r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:neo-al00d_firmware:8.1.0.175\(c786\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:potter-al00c_firmware:9.1.0.208\(c00e205r3p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:potter-al10a_firmware:9.1.0.208\(c00e205r3p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:princeton-al10b_firmware:9.1.0.211\(c00e203r2p2\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:princeton-al10d_firmware:9.1.0.212\(c00e204r2p2\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:princeton-al10i_firmware:9.0.1.150\(c675e9r1p4\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:princeton-al10i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:princeton-tl10c_firmware:9.1.0.211\(c01e203r2p2\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:tony-al00b_firmware:9.1.0.206\(c00e200r2p3\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:tony-tl00b_firmware:9.1.0.206\(c01e200r2p3\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:vogue-al00a_firmware:9.1.0.162\(c00e160r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:vogue-al00a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:vogue-al00a-preload_firmware:9.1.0.12\(c00r1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:vogue-al00a-preload:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:vogue-al10c_firmware:9.1.0.162\(c00e160r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:vogue-al10c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:vogue-al10c-preload_firmware:9.1.0.12\(c00r1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:vogue-al10c-preload:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:vogue-tl00b_firmware:9.1.0.162\(c01e160r2p1\):*:*:*:*:*:*:* OR cpe:2.3:h:huawei:vogue-tl00b:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2019-5235 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2019-5235 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.13 }} 0.04%

score

0.47051

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability