CVE-2024-51529

Improper Input Validation (CWE-20)

Published: Nov 5, 2024 / Updated: 14d ago

010
CVSS 5.5EPSS 0.04%Medium
CVE info copied to clipboard

Summary

Data verification vulnerability in the battery module. Successful exploitation of this vulnerability may affect function stability.

Impact

This vulnerability could lead to high availability impact. Successful exploitation may result in function instability, potentially causing disruptions to the battery module's operations. Given the local attack vector and low privileges required, an attacker with local access and low-level permissions could potentially exploit this vulnerability to cause system instability or crashes related to battery functionality.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Huawei has released a security bulletin addressing this vulnerability on November 7, 2024.

Mitigation

1. Apply the patch provided by Huawei as soon as possible. 2. Ensure that only trusted users have local access to affected systems. 3. Monitor for any unusual activity or instability in battery-related functions. 4. Update affected Huawei products to the latest versions, including EMUI (versions 12.0.0, 13.0.0, 14.0.0) and HarmonyOS (versions 2.0.0, 2.1.0, 3.0.0, 3.1.0, 4.0.0, 4.2.0). 5. Implement the principle of least privilege to minimize the potential impact of this vulnerability.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-51529. See article

Nov 5, 2024 at 8:32 AM / <object object at 0x79b19ecc4180>
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 5, 2024 at 11:25 AM
CVE Assignment

NVD published the first details for CVE-2024-51529

Nov 5, 2024 at 12:15 PM
CVSS

A CVSS base score of 5.5 has been assigned.

Nov 5, 2024 at 12:21 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 10%)

Nov 6, 2024 at 11:56 AM
Static CVE Timeline Graph

Affected Systems

Huawei/harmonyos
+null more

Patches

consumer.huawei.com
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

References

Huawei lists EMUI and HarmonyOS November 2024 security patch details
We’re on 5th November 2024 and Huawei has revealed new security patch details for its EMUI and HarmonyOS devices. Huawei has eliminated around 21 vulnerabilities with the November 2024 security patch for EMUI and HarmonyOS models.

News

NA - CVE-2024-51529 - Data verification vulnerability in the battery...
Data verification vulnerability in the battery module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2024-51529 | Huawei HarmonyOS up to 4.2.0 Battery Module denial of service
A vulnerability was found in Huawei HarmonyOS up to 4.2.0 . It has been rated as problematic . This issue affects some unknown processing of the component Battery Module . The manipulation leads to denial of service. The identification of this vulnerability is CVE-2024-51529 . An attack has to be approached locally. There is no exploit available.
CVE-2024-51529
Data verification vulnerability in the battery module Impact: Successful exploitation of this vulnerability may affect function...
CVE-2024-51529 - &quot;Qualcomm Snapdragon Battery Data Verification Vulnerability (Information Disclosure)&quot;
CVE ID : CVE-2024-51529 Published : Nov. 5, 2024, 12:15 p.m. 48 minutes ago Description : Data verification vulnerability in the battery module Impact: Successful exploitation of this vulnerability may affect function stability. Severity: 5.5
CVE-2024-51529
Data verification vulnerability in the battery module Impact: Successful exploitation of this vulnerability may affect function stability.
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI