{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T02:24:28.334","vulnerabilities":[{"cve":{"id":"CVE-2019-5213","sourceIdentifier":"psirt@huawei.com","published":"2019-11-12T23:15:10.160","lastModified":"2024-11-21T04:44:31.620","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Honor play smartphones with versions earlier than Cornell-AL00A 9.1.0.321(C00E320R1P1T8) have an insufficient authentication vulnerability. The system has a logic judge error under certain scenario. Successful exploit could allow the attacker to modify the alarm clock settings after a serious of uncommon operations without unlock the screen lock."},{"lang":"es","value":"Teléfonos Inteligentes Honor Play con versiones anteriores a Cornell-AL00A versión 9.1.0.321 (C00E320R1P1T8), presentan una vulnerabilidad de autenticación insuficiente. El sistema presenta un error de juez lógico bajo cierto escenario. Una explotación con éxito podría permitir al atacante modificar la configuración del reloj de alarma posterior a una serie de operaciones poco comunes sin desbloquear el bloqueo de pantalla."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:P/A:N","baseScore":1.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:honor_play_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"cornell-al00a_9.1.0.321\\(c00e320r1p1t8\\)","matchCriteriaId":"434EFE4E-FA21-4703-BF6C-5DB602E5EA63"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:honor_play:-:*:*:*:*:*:*:*","matchCriteriaId":"9B4BC963-31B0-4731-8D15-3EFD00E463BE"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191023-01-smartphone-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191023-01-smartphone-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}