Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-39967: Improper broadcast permission settings in Huawei EMUI

0
High
VulnerabilityCVE-2021-39967cvecve-2021-39967
Published: Mon Jan 03 2022 (01/03/2022, 21:07:41 UTC)
Source: CVE
Vendor/Project: Huawei
Product: EMUI

Description

There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:11:09 UTC

Technical Analysis

CVE-2021-39967 is a high-severity vulnerability affecting Huawei EMUI versions 9.1.0, 9.1.1, 10.0.0, 10.1.0, and 10.1.1. The vulnerability arises from improper broadcast permission settings within the EMUI operating system on Huawei smartphones. Broadcast intents in Android are a mechanism for inter-process communication, often used to notify apps or system components of events. Improper permission settings on these broadcasts can allow unauthorized applications or attackers to intercept sensitive broadcast information that should otherwise be restricted. In this case, the vulnerability enables an attacker to obtain broadcast information improperly without requiring any privileges or user interaction. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. Successful exploitation could lead to leakage of sensitive service-related information, potentially compromising user privacy or enabling further targeted attacks. There are no known exploits in the wild as of the publication date, and no official patches or mitigation links were provided in the source data. The vulnerability is specific to Huawei's EMUI customized Android OS, which is widely deployed on Huawei smartphones globally, including in Europe.

Potential Impact

For European organizations, the impact of CVE-2021-39967 primarily concerns the confidentiality of sensitive information on Huawei smartphones used by employees or within corporate environments. If exploited, attackers could intercept broadcast messages containing sensitive service data, potentially exposing confidential communications or enabling reconnaissance for further attacks. This could be particularly critical for sectors handling sensitive data such as finance, government, healthcare, or critical infrastructure. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing risk. However, the impact is limited to confidentiality without direct integrity or availability consequences. Organizations relying on Huawei devices for secure communications or mobile workforce operations may face increased risk of data leakage or privacy violations. Additionally, given Huawei's significant market share in certain European countries, the vulnerability could affect a substantial user base. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop weaponized exploits.

Mitigation Recommendations

To mitigate CVE-2021-39967, European organizations should: 1) Inventory Huawei EMUI devices in use and identify those running affected versions (9.1.0, 9.1.1, 10.0.0, 10.1.0, 10.1.1). 2) Monitor Huawei's official security advisories for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and monitor unusual broadcast-related activities. 4) Educate users about the risks of installing unverified apps that might exploit broadcast permissions. 5) Where feasible, consider restricting use of vulnerable Huawei devices for handling highly sensitive information until patches are applied. 6) Employ network-level protections such as segmentation and monitoring to detect anomalous traffic from mobile devices. 7) Collaborate with Huawei support channels to obtain guidance and updates on remediation. These steps go beyond generic advice by focusing on device inventory, patch management, user awareness, and network controls tailored to the specific nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2021-08-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f76020acd01a24926486c

Added to database: 5/22/2025, 7:07:46 PM

Last enriched: 7/8/2025, 6:11:09 AM

Last updated: 2/7/2026, 4:15:20 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats