{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:31:08.967","vulnerabilities":[{"cve":{"id":"CVE-2017-8161","sourceIdentifier":"psirt@huawei.com","published":"2017-11-22T19:29:03.740","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"EVA-L09 smartphones with software Earlier than EVA-L09C25B150CUSTC25D003 versions,Earlier than EVA-L09C440B140 versions,Earlier than EVA-L09C464B361 versions,Earlier than EVA-L09C675B320CUSTC675D004 versions have Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Swype and can perform some operations to update the Google account. As a result, the FRP function is bypassed."},{"lang":"es","value":"Los smartphones EVA-L09 con software anterior a las versiones EVA-L09C25B150CUSTC25D003, EVA-L09C440B140, EVA-L09C464B361 y EVA-L09C675B320CUSTC675D004 tienen una vulnerabilidad de omisión de Factory Reset Protection (FRP). Cuando se reconfigura el teléfono móvil utilizando la función Factory Reset Protection (FRP), un atacante puede iniciar sesión en Swype y realizar determinadas operaciones para actualizar la cuenta de Google. El resultado es que la función FRP se omite."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:C/A:N","baseScore":4.9,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"COMPLETE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-668"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*","versionEndExcluding":"eva-l09c25b150custc25d003","matchCriteriaId":"BEA0A8C6-485E-49D4-A924-2671F594EB7A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*","matchCriteriaId":"A321BCC8-2C89-4D53-914D-3CDC1247E0FD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*","versionEndExcluding":"eva-l09c440b140","matchCriteriaId":"3A6644E1-0919-4B43-B2CE-9C05A42726B3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*","matchCriteriaId":"A321BCC8-2C89-4D53-914D-3CDC1247E0FD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*","versionEndExcluding":"eva-l09c464b361","matchCriteriaId":"5BB54335-DBFD-4062-BDA3-D595BA872DA5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*","matchCriteriaId":"A321BCC8-2C89-4D53-914D-3CDC1247E0FD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:eva-l09:*:*:*:*:*:*:*:*","versionEndExcluding":"l09c675b320custc675d004","matchCriteriaId":"D09445B1-BEBB-47B2-8270-613E9DE14897"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:eva-l09:-:*:*:*:*:*:*:*","matchCriteriaId":"A321BCC8-2C89-4D53-914D-3CDC1247E0FD"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171013-01-frpbypass-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171013-01-frpbypass-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}