CVE-2019-5282
📋 TL;DR
This CVE describes a double free vulnerability in the Bastet module of certain Huawei smartphones. An attacker can trick users into installing a malicious app that frees the same memory address twice, potentially leading to arbitrary code execution. Only specific Huawei smartphone models running affected Android versions are vulnerable.
💻 Affected Systems
- Huawei smartphones with Bastet module
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise with attacker gaining complete control over the smartphone, allowing data theft, surveillance, and further network attacks.
Likely Case
Malicious app gains elevated privileges to access sensitive data, install additional malware, or perform unauthorized actions on the device.
If Mitigated
Attack fails due to app store protections, user awareness preventing malicious app installation, or device isolation from critical networks.
🎯 Exploit Status
Exploitation requires user interaction to install malicious app. No public exploit code has been disclosed according to available information.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to: Emily-AL00A 9.0.0.182(C00E82R1P21) or later, Emily-TL00B 9.0.0.182(C01E82R1P21) or later, Emily-L09C 9.0.0.203(C432E7R1P11) or later, Emily-L29C 9.0.0.203(C432E7R1P11) or later, Emily-L29C 9.0.0.202(C185E2R1P12) or later
Vendor Advisory: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190220-01-smartphone-en
Restart Required: Yes
Instructions:
1. Check current device model and version. 2. Navigate to Settings > System > System updates. 3. Download and install available updates. 4. Restart device after update completes.
🔧 Temporary Workarounds
Restrict app installation sources
androidOnly allow app installations from trusted sources like official app stores
Settings > Security > Install unknown apps > Disable for all apps
Enable Google Play Protect
androidUse built-in malware scanning for apps
Google Play Store > Menu > Play Protect > Turn on
🧯 If You Can't Patch
- Isolate affected devices from accessing sensitive corporate networks and data
- Implement mobile device management (MDM) policies to restrict app installations and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check device model and Android version in Settings > About phone. Compare against affected versions listed in the advisory.
Check Version:
Settings > About phone > Build number / Software version
Verify Fix Applied:
Verify device version is at or above the patched versions listed in the fix information.
📡 Detection & Monitoring
Log Indicators:
- Unexpected app installations from unknown sources
- Memory corruption errors in system logs
- Unusual process behavior or crashes
Network Indicators:
- Connections to known malicious domains from affected devices
- Unusual data exfiltration patterns
SIEM Query:
Device model contains 'Emily' AND version < patched_version AND (app_install_source != 'official_store' OR memory_error_logs)