Sploit.io - Search

Product: Y6¢ò, version: CAM-L21C10B130 and earlier versions, CAM-L21C185B1

CVE-2017-2696

Severity: Unknown

Description: The emerg_data driver in CAM-L21C10B130 and earlier versions, CAM-L21C185B141 and earlier versions has a buffer overflow vulnerability. An attacker with the root privilege of the Android system can tricks a user into installing a malicious application on the smart phone, and send given parameter to smart phone to crash the system or escalate privilege.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000730000
  • Percentile: 0.221330000
  • Date: 2026-03-03

ExploitDB

No data available.

HackerOne Data

  • Rank: 8832
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Huawei Technologies Co., Ltd. Y6¢ò - Versions: CAM-L21C10B130 and earlier versions, CAM-L21C185B141 and earlier versions

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2017-2696, is a buffer overflow within the emerg_data driver of Huawei smartphones running versions CAM-L21C10B130 and earlier, or CAM-L21C185B141 and earlier. The nature of a buffer overflow means that data written to a memory location exceeds the allocated buffer size, potentially overwriting adjacent memory and leading to system instability or code execution. The risk is moderate, as exploitation requires an attacker to have root privilege on the Android system, but they can trick a user into installing a malicious application. The ease of exploitation is considered moderate; while root access is needed, the user interaction component (installing an app) makes it reasonably achievable. The business impact could be significant. A successful exploit could lead to a system crash, causing downtime and potentially data loss. Privilege escalation could allow an attacker to gain full control of the device, compromising confidentiality, integrity and availability of data stored on the smartphone. The EPSS score of 0.00073 suggests a relatively low but non-negligible probability of exploitation given the overall attack surface.

    2. Potential Attack Scenarios
    An attacker can craft a malicious application that, when installed on a vulnerable Huawei smartphone, sends a specifically crafted parameter to the emerg_data driver. This parameter, designed to exceed the buffer’s capacity, causes a buffer overflow. The attack vector is through a user installing a seemingly legitimate application from a potentially untrusted source (e.g., a third-party app store or a compromised website). The attack process involves the user downloading and installing the app, then triggering the function that sends the overflowing parameter to the emerg_data driver. The potential outcome is either a system crash, disrupting the user’s activity, or privilege escalation, allowing the attacker to gain root access and potentially install malware, steal data, or control the device. The attacker could install a keylogger, exfiltrate contacts, or remotely control the phone.

    3. Mitigation Recommendations
    The primary mitigation is to update the affected Huawei smartphones to a version beyond CAM-L21C10B130 or CAM-L21C185B141. Huawei released updates to address this vulnerability, so users should ensure their devices have the latest software installed. Immediate actions include checking for and installing available system updates through the phone’s settings. Users should also exercise caution when installing applications from untrusted sources. Encourage users to only download apps from the official Google Play Store or other reputable app stores. Further investigation into the emerg_data driver’s functionality could identify further safeguards. The Huawei security advisory provides more detailed information: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170208-01-smartphone-en

    4. Executive Summary
    CVE-2017-2696 is a buffer overflow vulnerability affecting Huawei smartphones. A malicious application installed by a user can potentially crash the system or allow an attacker to gain full control of the device. While exploitation requires root privilege, the user interaction component makes it a viable threat. The vulnerability impacts the confidentiality, integrity, and availability of data stored on the smartphone. The most effective mitigation is to update the phone to the latest software version. It is important to address this vulnerability to prevent potential disruption, data loss, and compromise of user information. Prompt patching and cautious app installation practices are crucial for minimizing the risk. Addressing this vulnerability will improve the overall security posture of Huawei smartphones and protect user data.