{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T09:51:42.842","vulnerabilities":[{"cve":{"id":"CVE-2023-52710","sourceIdentifier":"psirt@huawei.com","published":"2024-05-28T07:15:10.100","lastModified":"2025-01-17T18:32:39.963","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Huawei Matebook D16(Model: CREM-WXX9, BIOS: v2.26), As the communication buffer size hasn’t been properly validated to be of the expected size, it can partially overlap with the beginning SMRAM.This can be leveraged by a malicious OS attacker to corrupt data structures stored at the beginning of SMRAM and can potentially lead to code execution in SMM."},{"lang":"es","value":"Huawei Matebook D16 (Modelo: CREM-WXX9, BIOS: v2.26). Como el tamaño del búfer de comunicación no se ha validado correctamente para que sea del tamaño esperado, puede superponerse parcialmente con la SMRAM inicial. Esto se puede aprovechar mediante un atacante malicioso del sistema operativo corrompe las estructuras de datos almacenadas al comienzo de SMRAM y puede conducir potencialmente a la ejecución de código en SMM."}],"metrics":{"cvssMetricV31":[{"source":"psirt@huawei.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@huawei.com","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*","matchCriteriaId":"2D0C60E9-E69E-4692-92FC-BDF8BD28346B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*","matchCriteriaId":"53861342-BCF5-49E5-A4C5-C1D1C472C8FF"}]}]}],"references":[{"url":"https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}