First published: Wed Nov 22 2017(Updated: )
The Trusted Execution Environment (TEE) module driver of Mate 9 and Mate 9 Pro smart phones with software versions earlier than MHA-AL00BC00B221 and versions earlier than LON-AL00BC00B221 has a use after free (UAF) vulnerability. An attacker tricks a user into installing a malicious application, and the application can start multiple threads and try to create and free specific memory, which could triggers access memory after free it and causes a system crash or arbitrary code execution.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei Mate 9 Firmware | <mha-al00bc00b221 | |
Huawei Mate 9 | ||
Huawei Mate 9 Pro Firmware | <lon-al00bc00b221 | |
Huawei Mate 9 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8142 is a use after free (UAF) vulnerability found in the Trusted Execution Environment (TEE) module driver of Huawei Mate 9 and Mate 9 Pro smartphones.
CVE-2017-8142 allows an attacker to trick a user into installing a malicious application, leading to a use after free vulnerability in the TEE module driver of Huawei Mate 9 and Mate 9 Pro smartphones.
CVE-2017-8142 has a severity score of 7.8 (critical).
To fix CVE-2017-8142, ensure that you have updated your Huawei Mate 9 and Mate 9 Pro smartphones to software versions MHA-AL00BC00B221 and LON-AL00BC00B221 or later.
You can find more information about CVE-2017-8142 on the Huawei Security Advisory page at http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170615-01-smartphone-en.