CVE-2020-9223

7.5 HIGH

📋 TL;DR

This vulnerability in some Huawei smartphones allows remote attackers to send specially crafted messages that cause denial of service (DoS) on specific modules. The attack can be executed without authentication and affects devices that receive these abnormal messages. Users of affected Huawei smartphone models are at risk.

💻 Affected Systems

Products:
  • Huawei smartphones (specific models not detailed in advisory)
Versions: Specific versions not detailed in advisory - check Huawei advisory for affected versions
Operating Systems: Android-based Huawei EMUI
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices receiving abnormal messages. Exact models and versions should be verified via Huawei's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of critical smartphone functions, rendering the device unusable until reboot or factory reset.

🟠

Likely Case

Temporary service disruption affecting specific modules (potentially network, messaging, or system services) requiring device reboot.

🟢

If Mitigated

No impact if patches are applied or if devices are not exposed to malicious messages.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation possible without authentication. Attack requires sending specially crafted messages to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Huawei security updates for specific device models

Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en

Restart Required: Yes

Instructions:

1. Check for security updates in device Settings > System & updates > Software update. 2. Install available security patches. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable unnecessary message services

all

Temporarily disable non-essential messaging services that could receive abnormal messages

Use network filtering

all

Implement network-level filtering to block suspicious messages

🧯 If You Can't Patch

  • Isolate vulnerable devices from untrusted networks
  • Implement strict network access controls and monitoring for abnormal message patterns

🔍 How to Verify

Check if Vulnerable:

Check device model and software version against Huawei's security advisory. Settings > About phone > Build number/EMUI version.

Check Version:

No command-line command - use device Settings menu

Verify Fix Applied:

Verify security patch level in Settings > About phone > Build number and ensure it includes December 2020 or later security patches.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Module/service failures
  • Abnormal message reception logs

Network Indicators:

  • Unusual message patterns to devices
  • Spike in malformed network packets

SIEM Query:

device_logs: ("crash" OR "DoS" OR "service failure") AND device_vendor:"Huawei"

🔗 References

📤 Share & Export