Man-in-the-middle attack vulnerability in the Clone module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
The product does not require that users should have strong passwords.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Emui | Huawei | 15.0.0 (including) | 15.0.0 (including) |
| Harmonyos | Huawei | 4.3.1 (including) | 4.3.1 (including) |
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.