Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-7990 : What You Need to Know

Learn about CVE-2018-7990 affecting Huawei Mate10 Pro smartphones. Discover how attackers can bypass 'Find My Phone' protection, the impact, and mitigation steps.

The Huawei Mate10 Pro smartphones with versions before 8.1.0.326(C00) are vulnerable to a FRP bypass issue, allowing attackers to bypass the 'Find My Phone' protection.

Understanding CVE-2018-7990

This CVE identifies a security vulnerability in Huawei Mate10 Pro devices that could be exploited by attackers to bypass the FRP feature.

What is CVE-2018-7990?

The vulnerability in Huawei Mate10 Pro devices with versions prior to 8.1.0.326(C00) allows attackers to circumvent the 'Find My Phone' protection during the reset process through specific voice and keyboard actions.

The Impact of CVE-2018-7990

If successfully exploited, this vulnerability enables attackers to bypass the FRP feature, compromising the security of the device and potentially accessing sensitive information.

Technical Details of CVE-2018-7990

Vulnerability Description

The vulnerability in Huawei Mate10 Pro devices before version 8.1.0.326(C00) allows for a bypass of the FRP protection feature during the reset process.

Affected Systems and Versions

        Product: Mate10 Pro
        Vendor: Huawei Technologies Co., Ltd.
        Vulnerable Versions: Versions before 8.1.0.326(C00)

Exploitation Mechanism

Attackers can exploit this vulnerability by performing a sequence of voice and keyboard actions during the reset process, enabling them to bypass the FRP protection.

Mitigation and Prevention

Immediate Steps to Take

        Update the device to version 8.1.0.326(C00) or later to patch the vulnerability.
        Avoid performing sensitive actions on the device until it is updated.

Long-Term Security Practices

        Regularly update the device's software to ensure the latest security patches are applied.
        Be cautious of downloading and installing apps from untrusted sources.

Patching and Updates

Ensure that the device is regularly updated with the latest firmware and security patches to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now