CVE-2021-39967: Improper broadcast permission settings in Huawei EMUI
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
AI Analysis
Technical Summary
CVE-2021-39967 is a high-severity vulnerability affecting Huawei EMUI versions 9.1.0, 9.1.1, 10.0.0, 10.1.0, and 10.1.1. The vulnerability arises from improper broadcast permission settings within the EMUI operating system on Huawei smartphones. Broadcast intents in Android are a mechanism for inter-process communication, often used to notify apps or system components of events. Improper permission settings on these broadcasts can allow unauthorized applications or attackers to intercept sensitive broadcast information that should otherwise be restricted. In this case, the vulnerability enables an attacker to obtain broadcast information improperly without requiring any privileges or user interaction. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. Successful exploitation could lead to leakage of sensitive service-related information, potentially compromising user privacy or enabling further targeted attacks. There are no known exploits in the wild as of the publication date, and no official patches or mitigation links were provided in the source data. The vulnerability is specific to Huawei's EMUI customized Android OS, which is widely deployed on Huawei smartphones globally, including in Europe.
Potential Impact
For European organizations, the impact of CVE-2021-39967 primarily concerns the confidentiality of sensitive information on Huawei smartphones used by employees or within corporate environments. If exploited, attackers could intercept broadcast messages containing sensitive service data, potentially exposing confidential communications or enabling reconnaissance for further attacks. This could be particularly critical for sectors handling sensitive data such as finance, government, healthcare, or critical infrastructure. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing risk. However, the impact is limited to confidentiality without direct integrity or availability consequences. Organizations relying on Huawei devices for secure communications or mobile workforce operations may face increased risk of data leakage or privacy violations. Additionally, given Huawei's significant market share in certain European countries, the vulnerability could affect a substantial user base. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop weaponized exploits.
Mitigation Recommendations
To mitigate CVE-2021-39967, European organizations should: 1) Inventory Huawei EMUI devices in use and identify those running affected versions (9.1.0, 9.1.1, 10.0.0, 10.1.0, 10.1.1). 2) Monitor Huawei's official security advisories for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and monitor unusual broadcast-related activities. 4) Educate users about the risks of installing unverified apps that might exploit broadcast permissions. 5) Where feasible, consider restricting use of vulnerable Huawei devices for handling highly sensitive information until patches are applied. 6) Employ network-level protections such as segmentation and monitoring to detect anomalous traffic from mobile devices. 7) Collaborate with Huawei support channels to obtain guidance and updates on remediation. These steps go beyond generic advice by focusing on device inventory, patch management, user awareness, and network controls tailored to the specific nature of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2021-39967: Improper broadcast permission settings in Huawei EMUI
Description
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2021-39967 is a high-severity vulnerability affecting Huawei EMUI versions 9.1.0, 9.1.1, 10.0.0, 10.1.0, and 10.1.1. The vulnerability arises from improper broadcast permission settings within the EMUI operating system on Huawei smartphones. Broadcast intents in Android are a mechanism for inter-process communication, often used to notify apps or system components of events. Improper permission settings on these broadcasts can allow unauthorized applications or attackers to intercept sensitive broadcast information that should otherwise be restricted. In this case, the vulnerability enables an attacker to obtain broadcast information improperly without requiring any privileges or user interaction. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. Successful exploitation could lead to leakage of sensitive service-related information, potentially compromising user privacy or enabling further targeted attacks. There are no known exploits in the wild as of the publication date, and no official patches or mitigation links were provided in the source data. The vulnerability is specific to Huawei's EMUI customized Android OS, which is widely deployed on Huawei smartphones globally, including in Europe.
Potential Impact
For European organizations, the impact of CVE-2021-39967 primarily concerns the confidentiality of sensitive information on Huawei smartphones used by employees or within corporate environments. If exploited, attackers could intercept broadcast messages containing sensitive service data, potentially exposing confidential communications or enabling reconnaissance for further attacks. This could be particularly critical for sectors handling sensitive data such as finance, government, healthcare, or critical infrastructure. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing risk. However, the impact is limited to confidentiality without direct integrity or availability consequences. Organizations relying on Huawei devices for secure communications or mobile workforce operations may face increased risk of data leakage or privacy violations. Additionally, given Huawei's significant market share in certain European countries, the vulnerability could affect a substantial user base. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop weaponized exploits.
Mitigation Recommendations
To mitigate CVE-2021-39967, European organizations should: 1) Inventory Huawei EMUI devices in use and identify those running affected versions (9.1.0, 9.1.1, 10.0.0, 10.1.0, 10.1.1). 2) Monitor Huawei's official security advisories for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and monitor unusual broadcast-related activities. 4) Educate users about the risks of installing unverified apps that might exploit broadcast permissions. 5) Where feasible, consider restricting use of vulnerable Huawei devices for handling highly sensitive information until patches are applied. 6) Employ network-level protections such as segmentation and monitoring to detect anomalous traffic from mobile devices. 7) Collaborate with Huawei support channels to obtain guidance and updates on remediation. These steps go beyond generic advice by focusing on device inventory, patch management, user awareness, and network controls tailored to the specific nature of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- huawei
- Date Reserved
- 2021-08-23T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f76020acd01a24926486c
Added to database: 5/22/2025, 7:07:46 PM
Last enriched: 7/8/2025, 6:11:09 AM
Last updated: 8/14/2025, 11:16:40 PM
Views: 17
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.