Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://consumer.huawei.com/en/support/bulletin/2023/8/ | vendor advisory |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 | vendor advisory |