Product name Confidentiality level
E8372h CONFIDENTIAL
Product version
Total 8 pages
V1.0
E8372h Firmware Release Notes
V1.0
Prepared by V7R11 team Date 2016-09-19
Reviewed by V7R11 team Date 2016-09-19
Approved by Date
Huawei Technologies Co., Ltd.
All rights reserved
Revision Record
Date Revisio FW-WebUI/Stick Change Description Author
n Version
version
2016-09-19 1.0 FW First version V7R11 team
21.321.01.00.00
2017-3-16 1.0 FW21.323.01.00.0 MR version liuming
0
2017-8-01 1.0 FW21.327.01.00.0 MR version liuming
0
2017-9-18 1.0 FW21.328.01.00.0 MR version Xiayichao
0
2017-10-24 1.0 FW21.328.03.00.0 MR version Xiayichao
0
2018-09-21 1.0 FW21.333.01.00.0 MR version E8372h-153
0 Team
2019-11-7 1.0 FW21.333.03.00.0 MR version E8372h-153
0 Team
Table of Contents
1 Main Features..........................................................................................................................4
2 Hardware.................................................................................................................................4
2.1 Hardware Specifications........................................................................................................................4
3 Firmware..................................................................................................................................5
3.1 Version Description................................................................................................................................5
3.2 Firmware Specifications........................................................................................................................5
3.3 Improvement in the Previous Version..................................................................................................5
3.1 Known Limitations and Issues..............................................................................................................6
4 WebUI/HiLink...........................................................................................................................6
4.1 Version Description................................................................................................................................6
4.2 WebUI/HiLink Specifications...............................................................................................................6
4.3 Improvement in the Previous Version..................................................................................................6
4.4 Known Limitations and Issues..............................................................................................................6
5 Software Vulnerabilities Fixes..................................................................................................7
6 Accessory Product from other Vendor.....................................................................................7
6.1 Known Limitations and Issues..............................................................................................................7
7 Others......................................................................................................................................7
8 Reference................................................................................................................................7
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
E8372h Firmware Release Notes V1.0
1 Main Features
The E8372h supports the following standards:
LTE cat4 data service up to 150Mbit/s (Downlink) and 50Mbit/s(Uplink)
DC-HSPA+ data service up to 43.2 Mbit/s
HSPA+ data service up to 21.6 Mbit/s
HSDPA packet data service of up to 14.4 Mbit/s
HSUPA data service up to 5.76 Mbit/s
WCDMA PS domain data service of up to 384 Kbit/s
Equalizer and receive diversity
microSD Card Slot (Up to 32G)
Data and SMS Service
Plug and play
Standard USB interface
CSFB
2 Hardware
2.1 Hardware Specifications
Item Specifications
Hardware Version CL1E8372HM Ver.A
LTE 3GPP R9
Technical standard HSPA+/UMTS: 3GPP R99/R5/R6/R7/R8
GSM/GPRS/EDGE: 3GPP R99
USB: Type A with standard USB 2.0 High speed interface
LED: indicating the status of the Data Card
External interfaces SD card: standard TF card interface
SIM/USIM card: standard 6-pin SIM card interface
RF interface: external RF interface
Maximum power
3.5 W
consumption
Power supply 5V
Dimensions (D × W × H) About 94mm(D) × 30mm(W) × 14mm (H)
Weight 50g
Page 4
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
Item Specifications
Operating: –10℃ to +40℃
Temperature
Storage: –20℃ to +70℃
Humidity 5% to 95%
Plug and play (PnP)
Base Information
Standard USB 2.0 High Speed interface, auto installation,
convenient for use
Note:
3GPP = The 3rd Generation Partnership Project
TS = Technical Specification
LED = Light-Emitting Diode
SIM = Subscriber Identity Module
USIM = UMTS Subscriber Identity Module
3 Firmware
3.1 Version Description
Firmware Version: 21.333.03.00.00
Baseline information Balong V7R11 C30B333
3.2 Firmware Specifications
Firmware
Item Specifications
Version 21.333.03.00.00
3.3 Improvement in the Previous Version
Index Case ID Issue Description
Firmware Version 21.333.03.00.00
Previous Firmware
Version
1
2
3
4
5
Page 5
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
3.4 Known Limitations and Issues
Index Case ID Issue Description
1 Unrealized
NA
Features
2
4 WebUI/HiLink
4.1 Version Description
WebUI/HiLink Version: 17.100.21.02.03
4.2 WebUI/HiLink Specifications
Item Specifications
4.3 Improvement in the Previous Version
Index Case ID Issue Description
WebUI Version 17.100.21.02.03
Previous WebUI
Version
1 New Features
4.4 Known Limitations and Issues
Index Case ID Issue Description
Unrealized
1
Features
Page 6
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
5 Software Vulnerabilities Fixes
[Software Vulnerabilities include Android Vulnerability, Third-party software Vulnerability, and Huawei
Vulnerability]
[Android Vulnerability is from Google, which reported publicly.]
[Third-party software is a type of computer software that is sold together with or provided for free in Huawei
products or solutions with the ownership of intellectual property rights (IPR) held by the original contributors.
Third-party software can be but is not limited to: Purchased software, Software that is built in or attached to
purchased hardware, Software in products of the original equipment manufacturer (OEM) or original design
manufacturer (ODM), Software that is developed with technical contribution from partners (ownership of IPR
all or partially held by the partners), Software that is legally obtained free of charge.
The data of third-party software vulnerabilities fixes can be exported from PDM.
If the table is excessively long, you can divide it into multiple ones by product version, or deliver it in an excel
file with patch release notes and provide reference information in this section.]
[Huawei Vulnerability is Huawei own software’ Vulnerability, which found by outside]
Vulnerabilities information is available through CVE IDs in NVD (National Vulnerability Database) website:
http://web.nvd.nist.gov/view/vuln/search
Software/Modul Version CVE ID Vulnerability Solution
e name Description
linux_kernel 3.10 CVE- An elevation of privilege
2017- vulnerability in the
0427 kernel file system could
enable a local malicious
application to execute
arbitrary code within the
context of the kernel.
This issue is rated as
Critical due to the
http://www.securityfocus.
possibility of a local
com/bid/96071
permanent device
compromise, which may
require reflashing the
operating system to
repair the device.
Product: Android.
Versions: Kernel-3.10,
Kernel-3.18. Android
ID: A-31495866.
linux_kernel 3.10 CVE- The alarm_timer_nsleep
2018- function in
13053 kernel/time/alarmtimer.c https://git.kernel.org/pub
in the Linux kernel /scm/linux/kernel/git/tip/t
through 4.17.3 has an ip.git/commit/?
integer overflow via a id=5f936e19cc0ef97dbe3
large relative timeout a56e9498922ad5ba1edef
because ktime_add_safe
is not used.
linux_kernel 3.10 CVE- The futex_requeue https://github.com/torval
2018- function in kernel/futex.c ds/linux/commit/fbe0e83
6927 in the Linux kernel 9d1e22d88810f3ee3e2f1
before 4.14.15 might 479be4c0aa4a
allow attackers to cause
a denial of service
(integer overflow) or
possibly have
Page 7
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
unspecified other impact
by triggering a negative
wake or requeue value.
linux_kernel 3.10 CVE- The HMAC
2017- implementation
17806 (crypto/hmac.c) in the
Linux kernel before
4.14.8 does not validate
that the underlying
cryptographic hash
algorithm is unkeyed,
allowing a local attacker
https://github.com/torval
able to use the AF_ALG-
ds/linux/commit/af3ff804
based hash interface
5bbf3e32f1a448542e73a
(CONFIG_CRYPTO_US
bb4c8ceb6f1
ER_API_HASH) and the
SHA-3 hash algorithm
(CONFIG_CRYPTO_SH
A3) to cause a kernel
stack buffer overflow by
executing a crafted
sequence of system calls
that encounter a missing
SHA-3 initialization.
linux_kernel 3.10 CVE- The
2017- usb_destroy_configurati
17558 on function in
drivers/usb/core/config.c
in the USB core
subsystem in the Linux
kernel through 4.14.5
does not consider the
maximum number of
https://www.spinics.net/li
configurations and
sts/linux-
interfaces before
usb/msg163644.html
attempting to release
resources, which allows
local users to cause a
denial of service (out-of-
bounds write access) or
possibly have
unspecified other impact
via a crafted USB
device.
linux_kernel 3.10 CVE- The raw_sendmsg()
2017- function in
17712 net/ipv4/raw.c in the
Linux kernel through
4.14.6 has a race https://github.com/torval
condition in inet- ds/linux/commit/8f659a0
>hdrincl that leads to 3a0ba9289b9aeb9b4470
uninitialized stack e6fb263d6f483
pointer usage; this
allows a local user to
execute code and gain
privileges.
linux_kernel 3.10 CVE- The https://github.com/torval
2014- sctp_assoc_lookup_asco ds/linux/commit/b69040d
3687 nf_ack function in 8e39f20d5215a03502a8e
net/sctp/associola.c in 8b4c6ab78395
Page 8
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
the SCTP
implementation in the
Linux kernel through
3.17.2 allows remote
attackers to cause a
denial of service (panic)
via duplicate ASCONF
chunks that trigger an
incorrect uncork within
the side-effect
interpreter.
linux_kernel 3.10 CVE- The sg implementation in
2016- the Linux kernel through
10088 4.9 does not properly
restrict write operations
in situations where the
KERNEL_DS option is
set, which allows local
users to read or write to
https://github.com/torval
arbitrary kernel memory
ds/linux/commit/128394e
locations or cause a
ff343fc6d2f32172f03e248
denial of service (use-
29539c5835
after-free) by leveraging
access to a /dev/sg
device, related to
block/bsg.c and
drivers/scsi/sg.c. NOTE:
this vulnerability exists
because of an incomplete
fix for CVE-2016-9576.
linux_kernel 3.10 CVE- The
2012- sock_alloc_send_pskb
2136 function in
net/core/sock.c in the
Linux kernel before 3.4.5
does not properly
https://github.com/torval
validate a certain length
ds/linux/commit/cc9b17a
value, which allows local
d29ecaa20bfe426a8d4db
users to cause a denial
fb94b13ff1cc
of service (heap-based
buffer overflow and
system crash) or possibly
gain privileges by
leveraging access to a
TUN/TAP device.
linux_kernel 3.10 CVE- net/netfilter/nf_conntrac
2014- k_proto_dccp.c in the
2523 Linux kernel through
3.13.6 uses a DCCP
header pointer
incorrectly, which allows
https://github.com/torval
remote attackers to
ds/linux/commit/b22f512
cause a denial of service
6a24b3b2f15448c3f2a25
(system crash) or
4fc10cbc2b92
possibly execute
arbitrary code via a
DCCP packet that
triggers a call to the (1)
dccp_new, (2)
dccp_packet, or (3)
Page 9
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
dccp_error function.
linux_kernel 3.10 CVE- The llc_cmsg_rcv
2016- function in
4485 net/llc/af_llc.c in the
Linux kernel before 4.5.5
https://github.com/torval
does not initialize a
ds/linux/commit/b8670c0
certain data structure,
9f37bdf2847cc44f36511a
which allows attackers
53afc6161fd
to obtain sensitive
information from kernel
stack memory by reading
a message.
linux_kernel 3.10 CVE- Linux kernel: heap out-
2017- of-bounds in
1000111 AF_PACKET sockets.
This new issue is
analogous to previously
disclosed CVE-2016-
8655. In both cases, a
socket option that
changes socket state may
race with safety checks
in packet_set_ring.
Previously with
PACKET_VERSION.
This time with
PACKET_RESERVE. http://patchwork.ozlabs.o
The solution is similar: rg/patch/800274/
lock the socket for the
update. This issue may
be exploitable, we did
not investigate further.
As this issue affects
PF_PACKET sockets, it
requires
CAP_NET_RAW in the
process namespace. But
note that with user
namespaces enabled,
any process can create a
namespace in which it
has CAP_NET_RAW.
6 Accessory Product from other Vendor
Version Description
Accessory Product Version:
6.1 Known Limitations and Issues
7 Others
8 Reference
Page 10
E8372h Firmware Release Notes V1.0 CONFIDENTIAL
Page 11