Impact
Based on the description, it is inferred that AiAssistant has a privilege bypass vulnerability that could allow attackers to gain higher privileges and potentially disrupt service availability. The vulnerability is categorized as a type privilege bypass, indicating that normal access controls can be subverted. The available information does not specify the exact mechanism or the extent of privileges that can be gained. Successful exploitation could affect the availability of the AiAssistant service, but there is no explicit evidence that it allows execution of privileged code or manipulation of the system state.
Affected Systems
The vulnerability affects Honor’s AiAssistant product. No specific version information is disclosed, so all iterations of AiAssistant that have not been patched are potentially vulnerable.
Risk and Exploitability
The CVSS Base score of 7.8 signifies a substantial risk level, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not cataloged in the CISA KEV list. Based on the description, it is inferred that the privilege bypass could allow an attacker to elevate privileges either locally or remotely by exploiting weaknesses in authentication or authorization controls. The likely attack vector is an unauthorized user who can gain higher privileges, potentially disrupting the AiAssistant service.
OpenCVE Enrichment