Authentication vulnerability in the distributed collaboration framework module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Link | Tags |
---|---|
https://consumer.huawei.com/en/support/bulletin/2025/7/ | vendor advisory |