{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T10:13:46.527","vulnerabilities":[{"cve":{"id":"CVE-2018-7901","sourceIdentifier":"psirt@huawei.com","published":"2018-04-30T14:29:00.470","lastModified":"2024-11-21T04:12:56.660","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RCS module in Huawei ALP-AL00B smart phones with software versions earlier than 8.0.0.129, BLA-AL00B smart phones with software versions earlier than 8.0.0.129 has a remote control vulnerability. An attacker can trick a user to install a malicious application. When the application connects with RCS for the first time, it needs user to manually click to agree. In addition, the attacker needs to obtain the key that RCS uses to authenticate the application. Successful exploitation may cause the attacker to control keyboard remotely."},{"lang":"es","value":"El módulo RCS en smartphones Huawei ALP-AL00B con software en versiones anteriores a la 8.0.0.129 y los smartphones BLA-AL00B con software en versiones anteriores a la 8.0.0.129 tiene una vulnerabilidad de control remoto. Un atacante puede engañar a un usuario para que instale una aplicación maliciosa. Cuando la aplicación se conecta con RCS por primera vez, necesita que el usuario haga clic de forma manual para acceder. Además, el atacante necesita obtener la clave que RCS emplea para autenticar la aplicación. Si se explota esta vulnerabilidad con éxito, el atacante podría controlar el teclado de forma remota."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.0.129","matchCriteriaId":"9F749C40-06B9-4A77-A04C-F26B88CD20B5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*","matchCriteriaId":"0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.0.129","matchCriteriaId":"0DA809E4-39D9-402B-985D-1FAEA03F923F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*","matchCriteriaId":"B11D6D9B-335B-404C-88F3-590DF9E5D878"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180425-01-rcs-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180425-01-rcs-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}