CVE-2021-46788

7.5 HIGH

📋 TL;DR

This vulnerability in Huawei's iConnect module allows third-party pop-up windows to be covered, potentially misleading users into performing unintended actions. It affects Huawei devices using the vulnerable iConnect module, primarily impacting consumer devices where users interact with system interfaces.

💻 Affected Systems

Products:
  • Huawei devices with iConnect module
Versions: Specific versions not detailed in provided references; affected versions would be those prior to May 2022 patches
Operating Systems: HarmonyOS, Android-based Huawei systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the iConnect module's pop-up window handling; exact device models not specified in provided references

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into granting permissions, installing malware, or performing destructive actions by clicking on malicious overlays that appear legitimate.

🟠

Likely Case

Users might inadvertently click on malicious buttons or links thinking they're legitimate system prompts, potentially compromising device security or privacy.

🟢

If Mitigated

With proper user awareness and security controls, the impact is limited to potential minor privacy violations or unwanted app installations.

🌐 Internet-Facing: MEDIUM - Exploitation requires user interaction with malicious content, but doesn't require direct internet-facing services.
🏢 Internal Only: LOW - This is primarily a client-side vulnerability affecting user interaction, not internal network services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires user interaction but minimal technical complexity to create malicious overlays

Exploitation requires user to interact with malicious content; no authentication needed as it's a client-side UI vulnerability

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2022 security updates

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2022/5/

Restart Required: Yes

Instructions:

1. Check for available updates in device Settings > System & updates > Software update. 2. Install May 2022 or later security updates. 3. Restart device after installation.

🔧 Temporary Workarounds

Disable unknown sources installation

all

Prevents installation of apps from outside official app stores, reducing attack surface

Settings > Security > Install unknown apps > Disable for all apps

Enable enhanced security mode

all

Uses Huawei's enhanced security features to detect and block suspicious activities

Settings > Security > Enhanced security > Enable

🧯 If You Can't Patch

  • Educate users to be cautious of unexpected pop-ups and verify legitimacy before clicking
  • Use alternative devices for sensitive operations until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check device security patch level in Settings > About phone > Build number; if before May 2022, likely vulnerable

Check Version:

Settings > About phone > Build number (no CLI command available)

Verify Fix Applied:

Verify security patch level shows May 2022 or later in Settings > About phone

📡 Detection & Monitoring

Log Indicators:

  • Unusual overlay permission requests
  • Multiple rapid pop-up window creations

Network Indicators:

  • No specific network indicators as this is local UI manipulation

SIEM Query:

Not applicable - client-side UI vulnerability with no server-side logging

🔗 References

📤 Share & Export