First published: Mon Mar 27 2023(Updated: )
The Bluetooth module has an authentication bypass vulnerability in the pairing process. Successful exploitation of this vulnerability may affect confidentiality.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei EMUI | =11.0.1 | |
Huawei EMUI | =12.0.0 | |
Huawei EMUI | =12.0.1 | |
Huawei EMUI | =13.0.0 | |
Huawei HarmonyOS | =2.0.0 | |
Huawei HarmonyOS | =2.0.1 | |
Huawei HarmonyOS | =3.0.0 | |
Huawei HarmonyOS | =3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48291 is rated as a high severity vulnerability due to its potential impact on confidentiality.
CVE-2022-48291 allows attackers to bypass authentication during the Bluetooth pairing process, potentially compromising user data.
CVE-2022-48291 affects various versions of Huawei Emui and HarmonyOS, specifically versions 11.0.1, 12.0.0, 12.0.1, 13.0.0, and HarmonyOS versions 2.0.0, 2.0.1, 3.0.0, and 3.1.0.
To mitigate CVE-2022-48291, users should update their affected Huawei Emui or HarmonyOS devices to the latest security patches provided by Huawei.
Yes, CVE-2022-48291 can potentially be exploited remotely if the Bluetooth feature is enabled on the vulnerable devices.