Critical vulnerability update from Huawei

Critical vulnerability update from Huawei


For Huawei, EMUI and Magic UI user interfaces March 2021 security update published. With this patch, on smartphones 2 critical, 13 high and 132 medium total 147 CVE security bug fixed.

Huawei has detailed the fixed CVE errors. He warned that malicious people could control the device. In addition, the company provided information about the dangers that these errors could pose.

How to install Huawei security update?

To update your phone to the latest software version; Settings> System> Software update You need to go to the section. From here “Check for Updates” When you click the button, your phone will automatically start the update process.

Huawei and Honor models that will receive EMUI 10 update!  - ShiftDelete.Net

Detected errors affect EMUI 10 and 11!

Huawei, March 2021 security update He listed the critical errors he corrected along with:

1) CVE-2021-22322: Logical bypass vulnerability in some Huawei phones

– Importance level: Middle
Affected versions: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0
– Effect: Successful exploitation of this vulnerability can damage data privacy.

2) CVE-2021-22317: Configuration error in some Huawei products

– Importance level: Middle
Affected versions: EMUI 11.0.1, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
– Effect: Successful exploitation of this vulnerability can damage data privacy.

3) CVE-2021-22316: Logical bypass vulnerability in some Huawei products due to design flaws

– Importance level: Middle
Affected versions: EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
– Effect: Attackers with physical access to the device could exploit this vulnerability. Exploitation of this vulnerability can compromise the data security and functional usability of the device.


Leave a Reply

Your email address will not be published. Required fields are marked *