Sploit.io - Search

Product: Jackman-AL00D, version: 8.2.0.185(C00R2P1)

CVE-2020-1848

Severity: Unknown

Description: There is a resource management error vulnerability in Jackman-AL00D versions 8.2.0.185(C00R2P1). Local attackers construct malicious application files, causing system applications to run abnormally.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000210000
  • Percentile: 0.049070000
  • Date: 2025-12-31

ExploitDB

No data available.

HackerOne Data

  • Rank: 8512
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Huawei Jackman-AL00D - Versions: 8.2.0.185(C00R2P1)

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2020-1848 is a resource management error within the Jackman-AL00D component of Huawei devices, specifically version 8.2.0.185(C00R2P1). This suggests that the device isn't efficiently handling resources when processing maliciously crafted application files. The business impact could range from minor performance degradation to complete application crashes, potentially impacting user experience and productivity. The likelihood of exploitation is moderate, as it requires local access to the device and the ability to install or execute malicious application files. The ease of exploitation is also moderate; while crafting the malicious file requires some understanding of the application structure, it doesn’t necessarily require complex exploitation techniques. The primary impact is on availability, as the vulnerability causes applications to run abnormally, potentially leading to crashes or freezes. Confidentiality and integrity are potentially impacted if the abnormal application behavior allows for data leakage or modification, though this is less direct. The EPSS score of 0.000210000 indicates a relatively low probability of exploitation in a wider context, but the impact on a compromised device can be significant.

    2. Potential Attack Scenarios
    A potential attack scenario involves a user downloading a seemingly legitimate application file that has been crafted to exploit the resource management vulnerability. The attacker could distribute the malicious application via a compromised app store, phishing email, or through a malicious website. The user installs the application and, when executed, the application consumes excessive resources due to the vulnerability. This could lead to the application crashing, or even causing the entire system to become unstable, potentially requiring a reboot. A more advanced attacker could craft the application to consume specific resources in a way that causes a denial-of-service condition or subtly leaks user data. The attack vector is a malicious application file, the attack process involves installation and execution, and the potential outcome is application crashes, system instability, or data compromise.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to apply the patch provided by Huawei for the Jackman-AL00D component. Users should ensure their devices are updated to the latest available firmware version. The Huawei security advisory, found at https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-02-smartphone-en, provides detailed information on the update and installation process. As an immediate action, users should be cautious when installing applications from untrusted sources and carefully review application permissions before granting access to device resources. Employing a mobile device management (MDM) solution can help enforce updates and control application installations across a fleet of devices. Regular security scans can also help identify potentially malicious applications.

    4. Executive Summary
    CVE-2020-1848 is a resource management vulnerability affecting Huawei devices running Jackman-AL00D version 8.2.0.185(C00R2P1). This vulnerability allows a local attacker to cause system applications to run abnormally by constructing malicious application files. While the probability of widespread exploitation is relatively low, the impact on a compromised device could be significant, leading to application crashes, system instability and potentially data compromise. To address this vulnerability, we recommend applying the patch provided by Huawei as soon as possible. Careful application installation practices and the use of mobile device management solutions can further reduce the risk. Prompt action is recommended to ensure smooth device operation and protect against potential disruption to user productivity.