{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:07:40.301","vulnerabilities":[{"cve":{"id":"CVE-2023-46755","sourceIdentifier":"psirt@huawei.com","published":"2023-11-08T10:15:08.683","lastModified":"2024-11-21T08:29:14.317","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart."},{"lang":"es","value":"Vulnerabilidad de que los parámetros de entrada no se verifiquen estrictamente en la entrada. La explotación exitosa de esta vulnerabilidad puede provocar que el iniciador se reinicie."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"A974CA73-84E8-480B-BB4C-4A81D0C985B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2DF07E7F-3A18-4B74-B73D-DF3647C2A48F"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*","matchCriteriaId":"353AEAF2-AF46-4835-93E1-4F942D5E2810"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"20112231-B840-44D3-A061-B9B9F80EE378"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"64118936-E2A5-4935-8594-29DF29B5475A"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"C01447F1-7F58-4AE3-B403-C01B2575D898"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"CB3751C1-7729-41D3-AE50-80B5AF601135"}]}]}],"references":[{"url":"https://consumer.huawei.com/en/support/bulletin/2023/11/","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://consumer.huawei.com/en/support/bulletin/2023/11/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}