Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Harmonyos | Huawei | 5.1.0 (including) | 5.1.0 (including) |
| Harmonyos | Huawei | 6.0.0 (including) | 6.0.0 (including) |