Thanks to Microsofts work, this company patched the flaw in January.
Now, lets go to see this critical vulnerability in Huawei laptops.
Usually, computer vendors ship devices with tools and software that facilitate gear management.
These tools including drivers often contain components running with ring-0 privileges in the kernel.
By default, these components are installed.
And each component must be as safe as the kernel.
Once there is one flawed component, the whole kernel security design will be in the risk.
The anomalous behavior stemmed from a equipment management driver developed by Huawei.
The flaw has left Huawei users exposed to kernel-level attacks.
The driver utility of Huawei was flagged by the new sensors and reported to Microsoft via Microsoft Defender ATP.
And then the ATP team reverse-engineered the driver so as to figure out what it was doing.
The investigation led researchers to the executable MateBookService.exe.
As a result, the flaw could lead to a full machine compromise.
This is because Microsoft alerted Huawei to this security flaw that was patched in January.
But it is embarrassing for Huawei and does little to help the statement that Huawei products are safe.