Vulnerabilites related to OpenHarmony - OpenHarmony
CVE-2022-45126 (GCVE-0-2022-45126)
Vulnerability from cvelistv5
Published
2023-01-09 02:22
Modified
2025-04-09 13:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 < Version: 3.0.0 < Version: 1.1.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:01:31.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45126", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:39:34.441217Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:39:52.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "1.1.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:22:23.465Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-45126", "datePublished": "2023-01-09T02:22:23.465Z", "dateReserved": "2022-11-24T11:48:41.242Z", "dateUpdated": "2025-04-09T13:39:52.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27131 (GCVE-0-2025-27131)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27131", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:30:43.859598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:30:51.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u0026nbsp;through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u00a0through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:58.944Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "kernel_liteos_m has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27131", "datePublished": "2025-06-08T11:46:58.944Z", "dateReserved": "2025-03-02T07:18:52.687Z", "dateUpdated": "2025-06-09T03:30:51.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-48360 (GCVE-0-2023-48360)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-17 20:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:30:34.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48360", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-02T15:15:30.638465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:29:05.789Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:11.968Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia player has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-48360", "datePublished": "2024-01-02T07:24:11.968Z", "dateReserved": "2023-11-28T02:07:56.559Z", "dateUpdated": "2025-06-17T20:29:05.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28226 (GCVE-0-2024-28226)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-12 13:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-28226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:11:55.991056Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:12:08.610Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:07.999Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Fs has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28226", "datePublished": "2024-04-02T06:23:07.999Z", "dateReserved": "2024-03-15T08:05:24.409Z", "dateUpdated": "2024-08-12T13:12:08.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-44455 (GCVE-0-2022-44455)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 13:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 Version: 3.0.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-44455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T15:27:13.698374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T15:27:27.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The appspawn and nwebspawn services within\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenHarmony-v3.1.2 and prior versions\u003c/span\u003e\n\nwere found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.\u0026nbsp;An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." } ], "value": "The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The appspawn and nwebspawn services were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-44455", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T13:54:03.395Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22837 (GCVE-0-2025-22837)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22837", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:23:10.999688Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:23:25.615Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:40.887Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22837", "datePublished": "2025-03-04T03:44:40.887Z", "dateReserved": "2025-01-20T02:01:05.647Z", "dateUpdated": "2025-03-04T14:23:25.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23234 (GCVE-0-2025-23234)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23234", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:57.350145Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:56.192Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:45.499Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23234", "datePublished": "2025-03-04T03:44:45.499Z", "dateReserved": "2025-01-20T01:59:30.188Z", "dateUpdated": "2025-03-11T16:09:56.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23240 (GCVE-0-2025-23240)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23240", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:54.142019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:50.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:46.625Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23240", "datePublished": "2025-03-04T03:44:46.625Z", "dateReserved": "2025-01-20T02:01:05.605Z", "dateUpdated": "2025-03-11T16:09:50.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-0285 (GCVE-0-2024-0285)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2025-05-07 20:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0285", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T17:44:15.598318Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-07T20:08:47.274Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:04.691Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-0285", "datePublished": "2024-02-02T06:19:04.691Z", "dateReserved": "2024-01-06T11:03:57.060Z", "dateUpdated": "2025-05-07T20:08:47.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20063 (GCVE-0-2025-20063)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:56.495009Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:33:04.168Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:20.731Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_engine has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20063", "datePublished": "2025-06-08T11:46:20.731Z", "dateReserved": "2025-03-02T07:18:04.356Z", "dateUpdated": "2025-06-09T03:33:04.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25176 (GCVE-0-2023-25176)
Vulnerability from cvelistv5
Published
2024-03-04 06:18
Modified
2024-08-02 11:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-25176", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-05T20:02:43.256719Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:18:45.255Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:18:53.563Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Pasteboard has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-25176", "datePublished": "2024-03-04T06:18:53.563Z", "dateReserved": "2023-11-28T02:39:39.375Z", "dateUpdated": "2024-08-02T11:18:35.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20011 (GCVE-0-2025-20011)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20011", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:32:42.609307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:32:56.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:23.499Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has a memory leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20011", "datePublished": "2025-03-04T03:44:23.499Z", "dateReserved": "2025-01-20T02:01:05.657Z", "dateUpdated": "2025-03-04T14:32:56.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23808 (GCVE-0-2024-23808)
Vulnerability from cvelistv5
Published
2024-05-07 06:26
Modified
2024-08-01 23:13
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "status": "affected", "version": "4.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23808", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T17:28:30.101622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:46:13.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:26:57.552Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler ets frontend has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-23808", "datePublished": "2024-05-07T06:26:57.552Z", "dateReserved": "2024-03-15T08:05:24.430Z", "dateUpdated": "2024-08-01T23:13:08.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36423 (GCVE-0-2022-36423)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-17 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-16 - Configuration
Summary
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < Version: OpenHarmony-v1.1.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:33.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "OpenHarmony-v1.1.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:56", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incorrect configuration of the cJSON library lead a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-36423", "STATE": "PUBLIC", "TITLE": "Incorrect configuration of the cJSON library lead a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.0.x-LTS", "version_value": "3.0.5" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v1.1.x-LTS", "version_value": "1.1.5" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-16 Configuration" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-36423", "datePublished": "2022-09-09T14:39:56.347649Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-17T04:03:39.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20021 (GCVE-0-2025-20021)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20021", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:31:51.305940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:32:07.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:24.626Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20021", "datePublished": "2025-03-04T03:44:24.626Z", "dateReserved": "2025-01-20T01:59:30.211Z", "dateUpdated": "2025-03-04T14:32:07.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21082 (GCVE-0-2025-21082)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:36.397866Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:32:42.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:32.576Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_engine has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21082", "datePublished": "2025-06-08T11:46:32.576Z", "dateReserved": "2025-03-02T07:18:04.365Z", "dateUpdated": "2025-06-09T03:32:42.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0304 (GCVE-0-2025-0304)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:46:53.432471Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:13.883Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0304", "datePublished": "2025-02-07T09:21:13.883Z", "dateReserved": "2025-01-07T07:59:43.985Z", "dateUpdated": "2025-02-12T19:41:07.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-10074 (GCVE-0-2024-10074)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:25:34.712506Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:26:34.062Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." } ], "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:19.668Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-10074", "datePublished": "2024-12-03T12:15:19.668Z", "dateReserved": "2024-10-17T07:55:53.383Z", "dateUpdated": "2024-12-03T14:26:34.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-41802 (GCVE-0-2022-41802)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 12:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 Version: 3.0.0 Version: 1.1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-41802", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T13:39:57.353625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T13:40:10.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "1.1.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-41802", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T12:56:38.164Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27534 (GCVE-0-2025-27534)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 15:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27534", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:24:19.012711Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:28:24.310Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:54.626Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27534", "datePublished": "2025-04-07T02:35:54.626Z", "dateReserved": "2025-03-02T07:18:52.643Z", "dateUpdated": "2025-04-07T15:28:24.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23414 (GCVE-0-2025-23414)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23414", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:48.547032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:38.750Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:48.822Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23414", "datePublished": "2025-03-04T03:44:48.822Z", "dateReserved": "2025-01-20T02:01:05.595Z", "dateUpdated": "2025-03-11T16:09:38.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47216 (GCVE-0-2023-47216)
Vulnerability from cvelistv5
Published
2024-01-02 07:23
Modified
2025-04-17 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-772 - Missing Release of Resource after Effective Lifetime
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47216", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-09T15:58:31.833787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:48:52.277Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources\n\n" } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-772", "description": "CWE-772 Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:23:02.954Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a missing release of resource vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47216", "datePublished": "2024-01-02T07:23:02.954Z", "dateReserved": "2023-11-28T02:39:39.390Z", "dateUpdated": "2025-04-17T18:48:52.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39816 (GCVE-0-2024-39816)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:52:43.847383Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:53:17.629Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:12.730Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39816", "datePublished": "2024-09-02T03:25:12.730Z", "dateReserved": "2024-07-22T03:22:00.918Z", "dateUpdated": "2024-09-03T14:53:17.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45382 (GCVE-0-2024-45382)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 13:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45382", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:07:17.095638Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T13:53:04.427Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:52.526Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-45382", "datePublished": "2024-10-08T03:03:52.526Z", "dateReserved": "2024-09-01T13:58:43.234Z", "dateUpdated": "2024-10-08T13:53:04.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43662 (GCVE-0-2022-43662)
Vulnerability from cvelistv5
Published
2023-01-09 02:23
Modified
2025-04-09 14:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 < Version: 3.0.0 < Version: 1.1.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:05.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43662", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:10:41.047025Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:11:21.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "1.1.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:23:02.577Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-43662", "datePublished": "2023-01-09T02:23:02.577Z", "dateReserved": "2022-11-24T11:48:41.247Z", "dateUpdated": "2025-04-09T14:11:21.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45734 (GCVE-0-2023-45734)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-22 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:29:32.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45734", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T14:16:48.559826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-22T14:17:01.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:00.202Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-45734", "datePublished": "2024-02-02T06:19:00.202Z", "dateReserved": "2023-11-28T02:39:39.359Z", "dateUpdated": "2024-08-22T14:17:01.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39612 (GCVE-0-2024-39612)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:54:31.863289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:54:40.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:05.302Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Background Task Manager has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39612", "datePublished": "2024-09-02T03:25:05.302Z", "dateReserved": "2024-07-22T03:22:00.841Z", "dateUpdated": "2024-09-03T14:54:40.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21084 (GCVE-0-2025-21084)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21084", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:25:39.029590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:25:59.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:34.096Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21084", "datePublished": "2025-03-04T03:44:34.096Z", "dateReserved": "2025-01-20T02:00:47.795Z", "dateUpdated": "2025-03-04T14:25:59.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22835 (GCVE-0-2025-22835)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22835", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:19:04.159328Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:10:11.459Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:39.777Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22835", "datePublished": "2025-03-04T03:44:39.777Z", "dateReserved": "2025-01-20T02:00:47.761Z", "dateUpdated": "2025-03-11T16:10:11.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22847 (GCVE-0-2025-22847)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22847", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:21:08.937608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:21:38.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:43.174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22847", "datePublished": "2025-03-04T03:44:43.174Z", "dateReserved": "2025-01-20T02:00:47.838Z", "dateUpdated": "2025-03-04T14:21:38.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3758 (GCVE-0-2024-3758)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3758", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T19:28:59.679961Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T19:11:48.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:11.250Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hmdfs has a heap buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3758", "datePublished": "2024-05-07T06:27:11.250Z", "dateReserved": "2024-04-13T06:30:15.502Z", "dateUpdated": "2024-08-01T20:20:01.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47857 (GCVE-0-2023-47857)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-03 14:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:16:43.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47857", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T19:10:45.713036Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-03T14:45:56.908Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:04.740Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia camera has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47857", "datePublished": "2024-01-02T07:24:04.740Z", "dateReserved": "2023-11-28T02:07:56.545Z", "dateUpdated": "2025-06-03T14:45:56.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37185 (GCVE-0-2024-37185)
Vulnerability from cvelistv5
Published
2024-07-02 08:14
Modified
2024-08-02 03:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37185", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:43:41.744864Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T13:47:55.221Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:14:03.131Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37185", "datePublished": "2024-07-02T08:14:03.131Z", "dateReserved": "2024-06-04T12:58:28.778Z", "dateUpdated": "2024-08-02T03:50:55.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26690 (GCVE-0-2025-26690)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:37:05.724996Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:37:10.526Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:08.028Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication dsoftbus has a NULL pointer vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26690", "datePublished": "2025-08-11T02:55:08.028Z", "dateReserved": "2025-03-02T07:20:06.684Z", "dateUpdated": "2025-08-11T20:37:10.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21816 (GCVE-0-2024-21816)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-04T14:25:48.491313Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:37:33.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:14.854Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Background task manager has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21816", "datePublished": "2024-03-04T06:19:14.854Z", "dateReserved": "2024-01-06T11:01:00.571Z", "dateUpdated": "2024-08-01T22:27:36.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22452 (GCVE-0-2025-22452)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 13:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:33:11.695343Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:33:20.329Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:30.455Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22452", "datePublished": "2025-04-07T02:35:30.455Z", "dateReserved": "2025-03-02T07:20:06.757Z", "dateUpdated": "2025-04-07T13:33:20.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27217 (GCVE-0-2024-27217)
Vulnerability from cvelistv5
Published
2024-05-07 06:26
Modified
2024-08-02 00:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "status": "affected", "version": "4.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-27217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:30:00.954384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:21.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:26:51.227Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "MSDP has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-27217", "datePublished": "2024-05-07T06:26:51.227Z", "dateReserved": "2024-03-15T08:05:24.422Z", "dateUpdated": "2024-08-02T00:27:59.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24844 (GCVE-0-2025-24844)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24844", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:35:58.892620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:36:17.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:14.157Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication_dsoftbus has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24844", "datePublished": "2025-08-11T02:55:14.157Z", "dateReserved": "2025-03-02T07:20:06.700Z", "dateUpdated": "2025-08-11T20:36:17.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-42774 (GCVE-0-2023-42774)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-28 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:30:24.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T18:40:43.068592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T19:45:07.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:35.478Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a incorrect default permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-42774", "datePublished": "2023-11-20T11:46:35.478Z", "dateReserved": "2023-11-06T02:28:36.162Z", "dateUpdated": "2024-08-28T19:45:07.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-42464 (GCVE-0-2022-42464)
Vulnerability from cvelistv5
Published
2022-10-14 14:40
Modified
2025-05-14 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:10:40.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-42464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:11:17.660462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:11:24.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00.000Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel memory pool override in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in furth ...", "x_ConverterErrors": { "TITLE": { "error": "TITLE too long. Truncating in v5 record.", "message": "Truncated!" } }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-42464", "datePublished": "2022-10-14T14:40:12.042Z", "dateReserved": "2022-10-08T00:00:00.000Z", "dateUpdated": "2025-05-14T15:11:24.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25218 (GCVE-0-2025-25218)
Vulnerability from cvelistv5
Published
2025-05-06 08:50
Modified
2025-05-06 15:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:26:33.558372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:30:17.612Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T08:50:02.099Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "third_party_mksh has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25218", "datePublished": "2025-05-06T08:50:02.099Z", "dateReserved": "2025-02-08T01:18:19.613Z", "dateUpdated": "2025-05-06T15:30:17.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-43756 (GCVE-0-2023-43756)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-02 19:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-43756", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T19:42:55.631278Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:26:03.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:38.658Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-43756", "datePublished": "2024-02-02T06:18:38.658Z", "dateReserved": "2023-11-28T02:07:56.578Z", "dateUpdated": "2024-08-02T19:52:11.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23409 (GCVE-0-2025-23409)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23409", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:51.357739Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:44.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:47.725Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23409", "datePublished": "2025-03-04T03:44:47.725Z", "dateReserved": "2025-01-20T02:00:47.859Z", "dateUpdated": "2025-03-11T16:09:44.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47402 (GCVE-0-2024-47402)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:25:58.182511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:26:16.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:29.635Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Out-of-bounds Read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47402", "datePublished": "2024-11-05T08:01:29.635Z", "dateReserved": "2024-10-07T06:18:37.598Z", "dateUpdated": "2024-11-05T14:26:16.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25278 (GCVE-0-2025-25278)
Vulnerability from cvelistv5
Published
2025-08-11 02:36
Modified
2025-08-11 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:40:04.055570Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:40:11.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:36:43.941Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25278", "datePublished": "2025-08-11T02:36:43.941Z", "dateReserved": "2025-03-02T07:20:06.732Z", "dateUpdated": "2025-08-11T20:40:11.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21089 (GCVE-0-2025-21089)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21089", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:24:40.971650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:25:04.733Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:35.302Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21089", "datePublished": "2025-03-04T03:44:35.302Z", "dateReserved": "2025-01-20T01:59:30.215Z", "dateUpdated": "2025-03-04T14:25:04.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25217 (GCVE-0-2025-25217)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:31:47.508462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:31:54.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:49.353Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_enginehas a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25217", "datePublished": "2025-06-08T11:46:49.353Z", "dateReserved": "2025-03-02T07:18:52.656Z", "dateUpdated": "2025-06-09T03:31:54.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45877 (GCVE-0-2022-45877)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 14:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:3.1:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-45877", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T17:39:53.656283Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-18T17:44:02.088Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks." } ], "value": "OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks." } ], "impacts": [ { "capecId": "CAPEC-94", "descriptions": [ { "lang": "en", "value": "CAPEC-94 Man in the Middle Attack" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-45877", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T14:24:03.232Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3757 (GCVE-0-2024-3757)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3757", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-24T14:46:05.320746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:32:26.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:07.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3757", "datePublished": "2024-05-07T06:27:07.124Z", "dateReserved": "2024-04-13T06:30:04.973Z", "dateUpdated": "2024-08-01T20:20:01.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43696 (GCVE-0-2024-43696)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43696", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:55:24.415562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:52.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:41.262Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Memory Leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-43696", "datePublished": "2024-10-08T03:03:41.262Z", "dateReserved": "2024-09-01T13:58:43.250Z", "dateUpdated": "2024-10-08T14:02:52.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27128 (GCVE-0-2025-27128)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 13:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T13:46:43.757295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T13:48:29.345Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:20.732Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27128", "datePublished": "2025-08-11T02:55:20.732Z", "dateReserved": "2025-03-02T07:18:52.672Z", "dateUpdated": "2025-08-11T13:48:29.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38081 (GCVE-0-2022-38081)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-16 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:56", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Tokensync in security subsystem has a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-38081", "STATE": "PUBLIC", "TITLE": "Tokensync in security subsystem has a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305 Authentication Bypass by Primary Weakness" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-38081", "datePublished": "2022-09-09T14:39:56.871079Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-16T20:26:45.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21851 (GCVE-0-2024-21851)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21851", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T19:51:34.875298Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:23.471Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:09.123Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21851", "datePublished": "2024-02-02T06:19:09.123Z", "dateReserved": "2024-01-06T11:01:00.643Z", "dateUpdated": "2024-08-01T22:27:36.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23420 (GCVE-0-2025-23420)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23420", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:37.736539Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:27.184Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:51.036Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23420", "datePublished": "2025-03-04T03:44:51.036Z", "dateReserved": "2025-01-20T01:59:30.234Z", "dateUpdated": "2025-03-11T16:09:27.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27563 (GCVE-0-2025-27563)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 15:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27563", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:04:29.239765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:04:35.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:13.415Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "security_access_token has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27563", "datePublished": "2025-06-08T11:47:13.415Z", "dateReserved": "2025-03-02T07:18:52.700Z", "dateUpdated": "2025-06-09T15:04:35.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27132 (GCVE-0-2025-27132)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27132", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:03:08.705171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:03:26.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:12.027Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27132", "datePublished": "2025-05-06T09:03:12.027Z", "dateReserved": "2025-03-02T07:18:04.233Z", "dateUpdated": "2025-05-06T15:03:26.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39806 (GCVE-0-2024-39806)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39806", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:56:12.460031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:03:07.248Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:27.301Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39806", "datePublished": "2024-10-08T03:03:27.301Z", "dateReserved": "2024-07-22T03:22:00.946Z", "dateUpdated": "2024-10-08T14:03:07.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28951 (GCVE-0-2024-28951)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-02 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28951", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T12:30:19.463893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-10T18:01:50.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:12.669Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28951", "datePublished": "2024-04-02T06:23:12.669Z", "dateReserved": "2024-03-15T08:05:24.413Z", "dateUpdated": "2024-08-02T01:03:51.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0035 (GCVE-0-2023-0035)
Vulnerability from cvelistv5
Published
2023-01-09 02:23
Modified
2025-04-09 14:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:08:45.617867Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:09:05.707Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\u003cbr\u003e" } ], "value": "softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:23:54.999Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "softbus_client_stub in communication subsystem has an authentication bypass vulnerability which allows an \"SA relay attack\".", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0035", "datePublished": "2023-01-09T02:23:54.999Z", "dateReserved": "2023-01-03T07:58:56.834Z", "dateUpdated": "2025-04-09T14:09:05.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6045 (GCVE-0-2023-6045)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-14 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6045", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:53:45.746657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:58:17.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:27.780Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-6045", "datePublished": "2023-11-20T11:46:27.780Z", "dateReserved": "2023-11-09T02:25:29.410Z", "dateUpdated": "2024-08-14T17:58:17.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-42488 (GCVE-0-2022-42488)
Vulnerability from cvelistv5
Published
2022-10-14 14:40
Modified
2025-05-14 15:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:10:40.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-42488", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:16:45.588490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:16:52.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00.000Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Startup subsystem missed permission validation in param service. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services.", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-42488", "datePublished": "2022-10-14T14:40:00.078Z", "dateReserved": "2022-10-08T00:00:00.000Z", "dateUpdated": "2025-05-14T15:16:52.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43495 (GCVE-0-2022-43495)
Vulnerability from cvelistv5
Published
2022-11-03 19:15
Modified
2025-04-30 14:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md | patch, vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43495", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T14:37:50.259247Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-30T14:38:12.462Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenHarmony-v3.1.2 and prior versions had a DOS vulnerability\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(246, 248, 250);\"\u003ein \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edistributedhardware_device_manager when joining a network.\u003c/span\u003e\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNetwork attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot.\u003c/span\u003e\n\n\n\n\u003c/span\u003e\u003c/span\u003e" } ], "value": "OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "An abnormal packet recieved when distributedhardware_device_manager joining a network could cause a device reboot.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-43495", "datePublished": "2022-11-03T19:15:16.052Z", "dateReserved": "2022-10-31T00:00:00.000Z", "dateUpdated": "2025-04-30T14:38:12.462Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46100 (GCVE-0-2023-46100)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-07 20:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-908 - Use of Uninitialized Resource
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:39.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T20:13:43.616571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T20:13:53.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:40.892Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cert manager has a use of uninitialized resource vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46100", "datePublished": "2023-11-20T11:46:40.892Z", "dateReserved": "2023-11-06T02:28:36.178Z", "dateUpdated": "2024-08-07T20:13:53.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41157 (GCVE-0-2024-41157)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:51:19.191943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:52:17.647Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:17.414Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-41157", "datePublished": "2024-09-02T03:25:17.414Z", "dateReserved": "2024-07-22T03:22:00.932Z", "dateUpdated": "2024-09-03T14:52:17.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25057 (GCVE-0-2025-25057)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 15:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25057", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:29:28.186698Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:28:40.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:48.580Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "third_party_NuttX has a memory leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25057", "datePublished": "2025-04-07T02:35:48.580Z", "dateReserved": "2025-02-08T01:18:19.588Z", "dateUpdated": "2025-04-07T15:28:40.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22886 (GCVE-0-2025-22886)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22886", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:02:33.939112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:02:46.649Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:16.384Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "distributeddatamgr_udmf has a memory leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22886", "datePublished": "2025-05-06T09:03:16.384Z", "dateReserved": "2025-03-02T07:18:04.257Z", "dateUpdated": "2025-05-06T15:02:46.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21863 (GCVE-0-2024-21863)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21863", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T18:27:34.786673Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:25.049Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:13.365Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21863", "datePublished": "2024-02-02T06:19:13.365Z", "dateReserved": "2024-01-06T11:01:00.652Z", "dateUpdated": "2024-08-01T22:27:36.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22301 (GCVE-0-2023-22301)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-02-27 21:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an
arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T21:01:13.896862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T21:01:25.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions\u0026nbsp;has an \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003earbitrary memory accessing \u003c/span\u003evulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.\u003cbr\u003e" } ], "value": "The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\narbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.\n" } ], "impacts": [ { "capecId": "CAPEC-47", "descriptions": [ { "lang": "en", "value": "CAPEC-47 Buffer Overflow via Parameter Expansion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:38.102Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The kernel subsystem hmdfs has a arbitrary memory accessing vulnerability.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-22301", "datePublished": "2023-03-10T10:44:38.102Z", "dateReserved": "2023-01-05T12:23:16.622Z", "dateUpdated": "2025-02-27T21:01:25.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47404 (GCVE-0-2024-47404)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:30:34.686696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:31:17.398Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:20.351Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has a double free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47404", "datePublished": "2024-11-05T08:01:20.351Z", "dateReserved": "2024-10-07T06:18:37.578Z", "dateUpdated": "2024-11-05T14:31:17.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0036 (GCVE-0-2023-0036)
Vulnerability from cvelistv5
Published
2023-01-09 02:24
Modified
2025-04-09 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:30:16.205831Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:32:40.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\u003cbr\u003e" } ], "value": "platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:24:08.067Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "platform_callback_stub in misc subsystem has an authentication bypass vulnerability which allows an \"SA relay attack\".", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0036", "datePublished": "2023-01-09T02:24:08.067Z", "dateReserved": "2023-01-03T08:00:50.786Z", "dateUpdated": "2025-04-09T13:32:40.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27242 (GCVE-0-2025-27242)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 14:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27242", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T14:59:18.573760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:59:32.250Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:18.615Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ssecurity_component_manager has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27242", "datePublished": "2025-06-08T11:47:18.615Z", "dateReserved": "2025-03-02T07:18:52.705Z", "dateUpdated": "2025-06-09T14:59:32.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31071 (GCVE-0-2024-31071)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T14:24:22.843456Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T16:35:43.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:04.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:30.953Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-31071", "datePublished": "2024-07-02T08:13:30.953Z", "dateReserved": "2024-04-13T06:30:40.959Z", "dateUpdated": "2024-08-02T01:46:04.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23235 (GCVE-0-2025-23235)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:10.623018Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:32:19.020Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:40.229Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23235", "datePublished": "2025-06-08T11:46:40.229Z", "dateReserved": "2025-03-02T07:18:04.347Z", "dateUpdated": "2025-06-09T03:32:19.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45118 (GCVE-0-2022-45118)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 14:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-45118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T18:08:53.008244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T18:09:01.910Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T14:01:31.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set.\u0026nbsp;Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions." } ], "value": "OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Telephony in communication subsystem sends public events with personal data, but the permission is not set.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-45118", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T14:01:31.541Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38386 (GCVE-0-2024-38386)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:55:14.665891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:55:51.237Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:00.908Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-38386", "datePublished": "2024-09-02T03:25:00.908Z", "dateReserved": "2024-07-22T03:22:00.926Z", "dateUpdated": "2024-09-03T14:55:51.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26691 (GCVE-0-2025-26691)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26691", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:30:12.671389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:30:20.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:04.449Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "telephony_call_manager has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26691", "datePublished": "2025-06-08T11:47:04.449Z", "dateReserved": "2025-03-02T07:18:04.330Z", "dateUpdated": "2025-06-09T03:30:20.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27536 (GCVE-0-2025-27536)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27536", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:36:40.710426Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:36:45.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:12.410Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27536", "datePublished": "2025-08-11T02:55:12.410Z", "dateReserved": "2025-03-02T07:18:04.338Z", "dateUpdated": "2025-08-11T20:36:45.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43451 (GCVE-0-2022-43451)
Vulnerability from cvelistv5
Published
2022-11-03 19:15
Modified
2024-08-03 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md | patch, vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:58.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenHarmony-v3.1.2 and prior versions had an\u0026nbsp;Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.\u003c/span\u003e\n\n" } ], "value": "OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Multiple path traversal in appspawn and nwebspawn services.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-43451", "datePublished": "2022-11-03T19:15:11.485048Z", "dateReserved": "2022-10-31T00:00:00", "dateUpdated": "2024-08-03T13:32:58.754Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22443 (GCVE-0-2025-22443)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 15:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:22:20.567817Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T15:22:29.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:38.676Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22443", "datePublished": "2025-03-04T03:44:38.676Z", "dateReserved": "2025-01-20T01:59:30.205Z", "dateUpdated": "2025-03-04T15:22:29.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22177 (GCVE-0-2024-22177)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-12 13:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22177", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:13:07.100374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:13:21.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:37.225Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Audio has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22177", "datePublished": "2024-04-02T06:22:37.225Z", "dateReserved": "2024-01-06T11:01:00.581Z", "dateUpdated": "2024-08-12T13:13:21.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22092 (GCVE-0-2024-22092)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-03T14:59:05.758033Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:42:59.478Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:58.948Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bundlemanager has an authentication bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22092", "datePublished": "2024-04-02T06:22:58.948Z", "dateReserved": "2024-03-15T08:05:24.400Z", "dateUpdated": "2024-08-01T22:35:34.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36260 (GCVE-0-2024-36260)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36260", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:47:54.804384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T13:48:04.106Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:58.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36260", "datePublished": "2024-07-02T08:13:58.124Z", "dateReserved": "2024-06-04T12:54:08.318Z", "dateUpdated": "2024-08-02T03:37:05.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47217 (GCVE-0-2023-47217)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-28 19:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T18:40:34.916023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T19:44:43.689Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:46.686Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47217", "datePublished": "2023-11-20T11:46:46.686Z", "dateReserved": "2023-11-06T02:28:36.151Z", "dateUpdated": "2024-08-28T19:44:43.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20024 (GCVE-0-2025-20024)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:30:50.466627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:31:01.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:26.109Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20024", "datePublished": "2025-03-04T03:44:26.109Z", "dateReserved": "2025-01-20T02:00:47.846Z", "dateUpdated": "2025-03-04T14:31:01.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24301 (GCVE-0-2025-24301)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:34.711366Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:21.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:52.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24301", "datePublished": "2025-03-04T03:44:52.124Z", "dateReserved": "2025-01-20T02:01:05.561Z", "dateUpdated": "2025-03-11T16:09:21.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22436 (GCVE-0-2023-22436)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-03-04 21:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:17:59.256359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:18:11.431Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions\u0026nbsp;has an \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUAF\u0026nbsp;\u003c/span\u003evulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.\u003cbr\u003e" } ], "value": "The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\nUAF\u00a0vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.\n" } ], "impacts": [ { "capecId": "CAPEC-92", "descriptions": [ { "lang": "en", "value": "CAPEC-92 Forced Integer Overflow" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:55.029Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The kernel subsystem function check_permission_for_set_tokenid has an UAF vulnerability.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-22436", "datePublished": "2023-03-10T10:44:55.029Z", "dateReserved": "2023-01-05T12:23:16.628Z", "dateUpdated": "2025-03-04T21:18:11.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38064 (GCVE-0-2022-38064)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-16 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:56", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "windowmanager in window subsystem has a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-38064", "STATE": "PUBLIC", "TITLE": "windowmanager in window subsystem has a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305 Authentication Bypass by Primary Weakness" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-38064", "datePublished": "2022-09-09T14:39:56.531029Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-16T18:07:49.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21098 (GCVE-0-2025-21098)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 15:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read bypass permission check.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:24:02.686930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T15:24:11.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read bypass permission check." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through\u00a0out-of-bounds read bypass permission check." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:37.554Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an insecure storage of sensitive information vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21098", "datePublished": "2025-03-04T03:44:37.554Z", "dateReserved": "2025-01-20T01:59:30.193Z", "dateUpdated": "2025-03-04T15:24:11.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37030 (GCVE-0-2024-37030)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:57:09.269107Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T14:02:20.289Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:36.884Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37030", "datePublished": "2024-07-02T08:13:36.884Z", "dateReserved": "2024-06-04T12:54:08.305Z", "dateUpdated": "2024-08-02T03:43:50.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27562 (GCVE-0-2025-27562)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-12 14:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27562", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T14:24:04.031422Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T14:24:10.448Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:24.122Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication_dsoftbus has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27562", "datePublished": "2025-08-11T02:55:24.122Z", "dateReserved": "2025-03-02T07:20:06.694Z", "dateUpdated": "2025-08-12T14:24:10.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20626 (GCVE-0-2025-20626)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20626", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:26:54.780060Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:27:09.856Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:32.771Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20626", "datePublished": "2025-03-04T03:44:32.771Z", "dateReserved": "2025-01-20T02:01:05.678Z", "dateUpdated": "2025-03-04T14:27:09.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49118 (GCVE-0-2023-49118)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-02 21:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.4", "status": "affected", "version": "3.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-49118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-25T14:18:59.526838Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T14:21:33.656Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:45.256Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49118", "datePublished": "2024-02-02T06:18:45.256Z", "dateReserved": "2023-11-28T02:39:39.384Z", "dateUpdated": "2024-08-02T21:46:29.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20102 (GCVE-0-2025-20102)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 13:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:33:43.017978Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:33:50.561Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:25.655Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20102", "datePublished": "2025-04-07T02:35:25.655Z", "dateReserved": "2025-01-20T02:00:47.813Z", "dateUpdated": "2025-04-07T13:33:50.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22897 (GCVE-0-2025-22897)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22897", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:19:00.576693Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:10:05.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:44.313Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22897", "datePublished": "2025-03-04T03:44:44.313Z", "dateReserved": "2025-01-20T01:59:30.223Z", "dateUpdated": "2025-03-11T16:10:05.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-54030 (GCVE-0-2024-54030)
Vulnerability from cvelistv5
Published
2025-01-07 07:57
Modified
2025-01-07 15:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-07T15:49:21.335500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-07T15:49:40.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS\u0026nbsp;through use after free." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS\u00a0through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-07T07:57:06.230Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication_dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-54030", "datePublished": "2025-01-07T07:57:06.230Z", "dateReserved": "2024-12-03T03:08:04.983Z", "dateUpdated": "2025-01-07T15:49:40.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24298 (GCVE-0-2025-24298)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:39:23.259568Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:39:28.859Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:01.139Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24298", "datePublished": "2025-08-11T02:55:01.139Z", "dateReserved": "2025-03-02T07:18:52.665Z", "dateUpdated": "2025-08-11T20:39:28.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47137 (GCVE-0-2024-47137)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:29:39.403203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:29:56.676Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:24.921Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47137", "datePublished": "2024-11-05T08:01:24.921Z", "dateReserved": "2024-10-07T06:18:37.589Z", "dateUpdated": "2024-11-05T14:29:56.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25052 (GCVE-0-2025-25052)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25052", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T14:38:12.611260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T14:48:41.647Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:38.566Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25052", "datePublished": "2025-05-06T09:03:38.566Z", "dateReserved": "2025-03-02T07:18:04.322Z", "dateUpdated": "2025-05-06T14:48:41.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29086 (GCVE-0-2024-29086)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-02 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-29086", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:13:51.026181Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:57:54.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:17.620Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has a stack overflow svulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-29086", "datePublished": "2024-04-02T06:23:17.620Z", "dateReserved": "2024-03-15T08:05:24.417Z", "dateUpdated": "2024-08-02T01:03:51.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43697 (GCVE-0-2024-43697)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43697", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:54:46.942557Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:43.222Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:46.535Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Improper Input Validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-43697", "datePublished": "2024-10-08T03:03:46.535Z", "dateReserved": "2024-09-01T13:58:43.245Z", "dateUpdated": "2024-10-08T14:02:43.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0303 (GCVE-0-2025-0303)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0303", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:48:18.556284Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:09.442Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0303", "datePublished": "2025-02-07T09:21:09.442Z", "dateReserved": "2025-01-07T07:59:40.569Z", "dateUpdated": "2025-02-12T19:41:07.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38700 (GCVE-0-2022-38700)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-16 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.1", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:56", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia subsystem has a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-38700", "STATE": "PUBLIC", "TITLE": "multimedia subsystem has a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305 Authentication Bypass by Primary Weakness" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-38700", "datePublished": "2022-09-09T14:39:56.696153Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-16T16:48:02.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0302 (GCVE-0-2025-0302)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0302", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:48:39.546476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.414Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:03.819Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an integer overflow read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0302", "datePublished": "2025-02-07T09:21:03.819Z", "dateReserved": "2025-01-07T07:59:38.265Z", "dateUpdated": "2025-02-12T19:41:07.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27241 (GCVE-0-2025-27241)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27241", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T14:51:19.025578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T14:54:50.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:33.143Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia_av_codec has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27241", "datePublished": "2025-05-06T09:03:33.143Z", "dateReserved": "2025-03-02T07:18:04.300Z", "dateUpdated": "2025-05-06T14:54:50.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31078 (GCVE-0-2024-31078)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-02 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31078", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:34:35.223133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T16:17:55.010Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:03.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:02.835Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bluetooth Service has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-31078", "datePublished": "2024-05-07T06:27:02.835Z", "dateReserved": "2024-04-13T06:30:40.953Z", "dateUpdated": "2024-08-02T01:46:03.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47797 (GCVE-0-2024-47797)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47797", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:31:27.650987Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:31:41.527Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:11.961Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47797", "datePublished": "2024-11-05T08:01:11.961Z", "dateReserved": "2024-10-07T06:18:37.546Z", "dateUpdated": "2024-11-05T14:31:41.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22180 (GCVE-0-2024-22180)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T12:31:11.302563Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-07T15:50:30.791Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:45.558Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Camera has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22180", "datePublished": "2024-04-02T06:22:45.558Z", "dateReserved": "2024-01-06T11:01:00.647Z", "dateUpdated": "2024-08-01T22:35:34.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27577 (GCVE-0-2025-27577)
Vulnerability from cvelistv5
Published
2025-08-11 02:36
Modified
2025-08-11 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27577", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:40:48.401368Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:40:55.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:36:29.047Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27577", "datePublished": "2025-08-11T02:36:29.047Z", "dateReserved": "2025-03-02T07:20:06.678Z", "dateUpdated": "2025-08-11T20:40:55.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46705 (GCVE-0-2023-46705)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-07 20:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46705", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T20:31:08.869240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T20:31:18.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:21.070Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46705", "datePublished": "2023-11-20T11:46:21.070Z", "dateReserved": "2023-11-06T02:28:36.166Z", "dateUpdated": "2024-08-07T20:31:18.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49142 (GCVE-0-2023-49142)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-17 20:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49142", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T20:22:50.484905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:29:06.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:22.879Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia audio has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49142", "datePublished": "2024-01-02T07:24:22.879Z", "dateReserved": "2023-11-28T02:07:56.536Z", "dateUpdated": "2025-06-17T20:29:06.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-43612 (GCVE-0-2023-43612)
Vulnerability from cvelistv5
Published
2023-11-20 11:45
Modified
2024-08-28 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:44.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.2", "status": "affected", "version": "3.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-43612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T22:52:24.707941Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T22:53:52.977Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:45:59.360Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hiview has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-43612", "datePublished": "2023-11-20T11:45:59.360Z", "dateReserved": "2023-11-06T02:28:36.172Z", "dateUpdated": "2024-08-28T22:53:52.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49135 (GCVE-0-2023-49135)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2024-11-14 19:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49135", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-16T15:43:44.377905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:23:02.826Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:17.361Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia player has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49135", "datePublished": "2024-01-02T07:24:17.361Z", "dateReserved": "2023-11-28T02:07:56.551Z", "dateUpdated": "2024-11-14T19:23:02.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36243 (GCVE-0-2024-36243)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36243", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T14:22:24.926933Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T16:34:18.599Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:03.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:41.186Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36243", "datePublished": "2024-07-02T08:13:41.186Z", "dateReserved": "2024-06-04T12:54:08.310Z", "dateUpdated": "2024-08-02T03:37:03.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21834 (GCVE-0-2024-21834)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21834", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:41:44.860692Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:38:06.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:31.538Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkui has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21834", "datePublished": "2024-04-02T06:22:31.538Z", "dateReserved": "2024-01-06T11:01:00.563Z", "dateUpdated": "2024-08-01T22:27:36.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-12082 (GCVE-0-2024-12082)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:24
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:24:51.471804Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:24:59.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:24.779Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ability Runtime has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-12082", "datePublished": "2024-12-03T12:15:24.779Z", "dateReserved": "2024-12-03T03:07:22.774Z", "dateUpdated": "2024-12-03T14:24:59.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22842 (GCVE-0-2025-22842)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22842", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T13:32:41.765835Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T13:32:50.035Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:35.271Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22842", "datePublished": "2025-04-07T02:35:35.271Z", "dateReserved": "2025-02-08T01:18:19.568Z", "dateUpdated": "2025-04-07T13:32:50.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46708 (GCVE-0-2023-46708)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-02 20:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46708", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-04T14:11:50.396935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T01:35:02.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:03.484Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Wlan has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46708", "datePublished": "2024-03-04T06:19:03.484Z", "dateReserved": "2023-11-28T02:39:39.368Z", "dateUpdated": "2024-08-02T20:53:20.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24309 (GCVE-0-2025-24309)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24309", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:31.403724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:14.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:53.216Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24309", "datePublished": "2025-03-04T03:44:53.216Z", "dateReserved": "2025-01-20T02:01:05.570Z", "dateUpdated": "2025-03-11T16:09:14.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23418 (GCVE-0-2025-23418)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23418", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:45.676242Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:32.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:49.916Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23418", "datePublished": "2025-03-04T03:44:49.916Z", "dateReserved": "2025-01-20T02:00:47.842Z", "dateUpdated": "2025-03-11T16:09:32.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0083 (GCVE-0-2023-0083)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-02-27 21:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions,
OpenHarmony-v3.0.7 and prior versions
has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:42.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0083", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T21:01:59.651188Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T21:02:12.734Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.7", "status": "affected", "version": "3.0", "versionType": "custom" }, { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, \n\nOpenHarmony-v3.0.7 and prior versions\n\nhas an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.\u003cbr\u003e" } ], "value": "The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, \n\nOpenHarmony-v3.0.7 and prior versions\n\nhas an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.\n" } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:22.877Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The ArkUI framework subsystem doesn\u0027t check the input parameter,causing type confusion and invalid memory access.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0083", "datePublished": "2023-03-10T10:44:22.877Z", "dateReserved": "2023-01-05T12:32:56.058Z", "dateUpdated": "2025-02-27T21:02:12.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24581 (GCVE-0-2024-24581)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2025-03-04 21:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24581", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:52:13.625448Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:53:06.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:19:52.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:03.141Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-24581", "datePublished": "2024-04-02T06:23:03.141Z", "dateReserved": "2024-03-15T08:05:24.404Z", "dateUpdated": "2025-03-04T21:53:06.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-3116 (GCVE-0-2023-3116)
Vulnerability from cvelistv5
Published
2023-11-20 11:44
Modified
2024-08-29 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:07.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:48:47.307043Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T20:48:35.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:44:26.409Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a incorrect default permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-3116", "datePublished": "2023-11-20T11:44:26.409Z", "dateReserved": "2023-06-06T06:29:14.227Z", "dateUpdated": "2024-08-29T20:48:35.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22098 (GCVE-0-2024-22098)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-17T14:37:43.746741Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T14:37:50.130Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:41.611Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "AVSession has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22098", "datePublished": "2024-04-02T06:22:41.611Z", "dateReserved": "2024-01-06T11:01:00.591Z", "dateUpdated": "2024-08-01T22:35:34.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0587 (GCVE-0-2025-0587)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:33:24.323574Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:33:49.389Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:22.237Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0587", "datePublished": "2025-03-04T03:44:22.237Z", "dateReserved": "2025-01-20T01:58:09.157Z", "dateUpdated": "2025-03-04T14:33:49.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3759 (GCVE-0-2024-3759)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3759", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:52:08.409712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:41:18.547Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.133Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:19.917Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hmdfs has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3759", "datePublished": "2024-05-07T06:27:19.917Z", "dateReserved": "2024-04-13T06:30:21.325Z", "dateUpdated": "2024-08-01T20:20:01.133Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38701 (GCVE-0-2022-38701)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-16 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:57", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "IPC in communication subsystem has a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-38701", "STATE": "PUBLIC", "TITLE": "IPC in communication subsystem has a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.0.x-LTS", "version_value": "3.0.5" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-38701", "datePublished": "2022-09-09T14:39:57.040763Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-16T19:10:47.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24304 (GCVE-0-2025-24304)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 15:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:29:51.277869Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:29:22.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:43.825Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24304", "datePublished": "2025-04-07T02:35:43.825Z", "dateReserved": "2025-01-20T02:01:05.631Z", "dateUpdated": "2025-04-07T15:29:22.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38382 (GCVE-0-2024-38382)
Vulnerability from cvelistv5
Published
2024-09-02 03:24
Modified
2024-09-03 14:56
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38382", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:56:19.059483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:56:33.327Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:24:56.930Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ability Runtime has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-38382", "datePublished": "2024-09-02T03:24:56.930Z", "dateReserved": "2024-07-22T03:22:00.852Z", "dateUpdated": "2024-09-03T14:56:33.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21097 (GCVE-0-2025-21097)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 15:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:24:55.676043Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T15:25:03.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:36.476Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21097", "datePublished": "2025-03-04T03:44:36.476Z", "dateReserved": "2025-01-20T02:00:47.851Z", "dateUpdated": "2025-03-04T15:25:03.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24493 (GCVE-0-2025-24493)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24493", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:31:22.237042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:31:29.376Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:53.804Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "kernel_liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24493", "datePublished": "2025-06-08T11:46:53.804Z", "dateReserved": "2025-03-02T07:18:52.680Z", "dateUpdated": "2025-06-09T03:31:29.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25947 (GCVE-0-2023-25947)
Vulnerability from cvelistv5
Published
2023-03-10 10:45
Modified
2025-03-03 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:39:06.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25947", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T20:50:00.403179Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T20:50:14.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehas a null pointer reference vulnerability\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003ewhich local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.\u003cbr\u003e" } ], "value": "The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions\u00a0has a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.\n" } ], "impacts": [ { "capecId": "CAPEC-92", "descriptions": [ { "lang": "en", "value": "CAPEC-92 Forced Integer Overflow" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:45:30.665Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The bundle management subsystem has a improper input validation when installing a HAP package.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-25947", "datePublished": "2023-03-10T10:45:30.665Z", "dateReserved": "2023-03-07T03:52:10.706Z", "dateUpdated": "2025-03-03T20:50:14.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20081 (GCVE-0-2025-20081)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:28:43.107140Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:29:00.301Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:28.501Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20081", "datePublished": "2025-03-04T03:44:28.501Z", "dateReserved": "2025-01-20T02:00:47.855Z", "dateUpdated": "2025-03-04T14:29:00.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47398 (GCVE-0-2024-47398)
Vulnerability from cvelistv5
Published
2025-01-07 07:57
Modified
2025-01-07 15:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47398", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-07T15:30:43.804496Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-07T15:31:30.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-07T07:57:02.974Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47398", "datePublished": "2025-01-07T07:57:02.974Z", "dateReserved": "2024-12-03T03:08:04.972Z", "dateUpdated": "2025-01-07T15:31:30.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26693 (GCVE-0-2025-26693)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 03:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26693", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:29:47.500862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:29:57.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:09.091Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "security_access_token has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26693", "datePublished": "2025-06-08T11:47:09.091Z", "dateReserved": "2025-03-02T07:18:52.692Z", "dateUpdated": "2025-06-09T03:29:57.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24925 (GCVE-0-2025-24925)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24925", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:38:50.449379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:38:55.412Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:05.184Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "applications_settings has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24925", "datePublished": "2025-08-11T02:55:05.184Z", "dateReserved": "2025-03-02T07:20:06.665Z", "dateUpdated": "2025-08-11T20:38:55.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27247 (GCVE-0-2025-27247)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 13:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27247", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T13:57:52.799480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T13:59:06.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:25.245Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Pasteboard has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27247", "datePublished": "2025-06-08T11:47:25.245Z", "dateReserved": "2025-03-02T07:18:52.710Z", "dateUpdated": "2025-06-09T13:59:06.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21845 (GCVE-0-2024-21845)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21845", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T19:49:51.432541Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:23.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:49.976Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21845", "datePublished": "2024-02-02T06:18:49.976Z", "dateReserved": "2024-01-06T11:01:00.636Z", "dateUpdated": "2024-08-01T22:27:36.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21860 (GCVE-0-2024-21860)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-11-08 15:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions
allow an adjacent attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-21860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T21:03:38.565314Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T15:38:33.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:55.540Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21860", "datePublished": "2024-02-02T06:18:55.540Z", "dateReserved": "2024-01-06T11:01:00.629Z", "dateUpdated": "2024-11-08T15:38:33.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20091 (GCVE-0-2025-20091)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:28:08.616122Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:28:22.984Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:29.655Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20091", "datePublished": "2025-03-04T03:44:29.655Z", "dateReserved": "2025-01-20T02:01:05.553Z", "dateUpdated": "2025-03-04T14:28:22.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36278 (GCVE-0-2024-36278)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:01:57.460264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T16:31:26.825Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:04.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:50.234Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36278", "datePublished": "2024-07-02T08:13:50.234Z", "dateReserved": "2024-06-04T12:54:08.314Z", "dateUpdated": "2024-08-02T03:37:04.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37077 (GCVE-0-2024-37077)
Vulnerability from cvelistv5
Published
2024-07-02 08:14
Modified
2024-08-02 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37077", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T13:03:55.581949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:59:35.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:14:14.059Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37077", "datePublished": "2024-07-02T08:14:14.059Z", "dateReserved": "2024-06-04T12:58:28.785Z", "dateUpdated": "2024-08-02T03:43:50.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45070 (GCVE-0-2024-45070)
Vulnerability from cvelistv5
Published
2025-01-07 07:56
Modified
2025-01-07 15:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45070", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-07T15:31:55.943127Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-07T15:32:33.718Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-07T07:56:57.140Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-45070", "datePublished": "2025-01-07T07:56:57.140Z", "dateReserved": "2024-12-03T03:08:04.960Z", "dateUpdated": "2025-01-07T15:32:33.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27248 (GCVE-0-2025-27248)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27248", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:00:57.037767Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:01:25.369Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:26.206Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "ai_neural_network_runtime has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27248", "datePublished": "2025-05-06T09:03:26.206Z", "dateReserved": "2025-03-02T07:18:04.268Z", "dateUpdated": "2025-05-06T15:01:25.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49602 (GCVE-0-2023-49602)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-12 13:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:41:39.162823Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:41:57.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:09.503Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkui has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49602", "datePublished": "2024-03-04T06:19:09.503Z", "dateReserved": "2023-11-28T02:07:56.574Z", "dateUpdated": "2024-08-12T13:41:57.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43449 (GCVE-0-2022-43449)
Vulnerability from cvelistv5
Published
2022-11-03 19:15
Modified
2025-05-02 18:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md | patch, vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-02T18:49:15.636648Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-02T18:49:44.928Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenHarmony-v3.1.2 and prior versions had an\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(246, 248, 250);\"\u003eArbitrary file read\u0026nbsp;\u003c/span\u003evulnerability\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(246, 248, 250);\"\u003evia download_server.\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(246, 248, 250);\"\u003eLocal attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.\u003c/span\u003e\n\n\u003c/span\u003e\u003c/span\u003e" } ], "value": "OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000." } ], "impacts": [ { "capecId": "CAPEC-72", "descriptions": [ { "lang": "en", "value": "CAPEC-72 URL Encoding" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md", "tags": [ "patch", "vendor-advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary file read via download_server.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-43449", "datePublished": "2022-11-03T19:15:14.052Z", "dateReserved": "2022-10-31T00:00:00.000Z", "dateUpdated": "2025-05-02T18:49:44.928Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39775 (GCVE-0-2024-39775)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:53:52.211905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:54:00.588Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:08.863Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Net Manager has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39775", "datePublished": "2024-09-02T03:25:08.863Z", "dateReserved": "2024-07-22T03:22:00.887Z", "dateUpdated": "2024-09-03T14:54:00.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-41686 (GCVE-0-2022-41686)
Vulnerability from cvelistv5
Published
2022-10-14 14:40
Modified
2025-05-14 15:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-41686", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:16:04.778398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:16:13.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00.000Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Out-of-bound memory read and write in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The proc ...", "x_ConverterErrors": { "TITLE": { "error": "TITLE too long. Truncating in v5 record.", "message": "Truncated!" } }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-41686", "datePublished": "2022-10-14T14:40:04.568Z", "dateReserved": "2022-10-08T00:00:00.000Z", "dateUpdated": "2025-05-14T15:16:13.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-24465 (GCVE-0-2023-24465)
Vulnerability from cvelistv5
Published
2023-03-10 10:45
Modified
2025-03-04 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions
has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:17:00.437543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:17:09.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1", "versionType": "custom" }, { "lessThanOrEqual": "3.0.7", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehas a null pointer reference vulnerability\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003ewhich local attackers can exploit this vulnerability to cause the current application to crash.\u003cbr\u003e" } ], "value": "Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions\n\nhas a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause the current application to crash.\n" } ], "impacts": [ { "capecId": "CAPEC-6", "descriptions": [ { "lang": "en", "value": "CAPEC-6 Argument Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:45:12.940Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Wi-Fi \u00a0subsystem has a null pointer reference vulnerability when receving external data.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-24465", "datePublished": "2023-03-10T10:45:12.940Z", "dateReserved": "2023-03-07T03:52:10.691Z", "dateUpdated": "2025-03-04T21:17:09.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-42463 (GCVE-0-2022-42463)
Vulnerability from cvelistv5
Published
2022-10-14 14:40
Modified
2025-05-14 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:10:41.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-42463", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:11:34.807910Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:11:42.282Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00.000Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Softbus_server in communication subsystem has a authenication bypass vulnerability in a callback handler function. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary co ...", "x_ConverterErrors": { "TITLE": { "error": "TITLE too long. Truncating in v5 record.", "message": "Truncated!" } }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-42463", "datePublished": "2022-10-14T14:40:09.252Z", "dateReserved": "2022-10-08T00:00:00.000Z", "dateUpdated": "2025-05-14T15:11:42.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28044 (GCVE-0-2024-28044)
Vulnerability from cvelistv5
Published
2024-09-02 03:24
Modified
2024-09-03 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:57:16.271630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:57:32.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:24:52.604Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28044", "datePublished": "2024-09-02T03:24:52.604Z", "dateReserved": "2024-07-22T03:22:00.940Z", "dateUpdated": "2024-09-03T14:57:32.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21826 (GCVE-0-2024-21826)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21826", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-07T19:52:08.070021Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:37:44.174Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:21.663Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Huks has an insecure storage of sensitive information vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21826", "datePublished": "2024-03-04T06:19:21.663Z", "dateReserved": "2024-01-06T11:01:00.616Z", "dateUpdated": "2024-08-01T22:27:36.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39831 (GCVE-0-2024-39831)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39831", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:55:42.635827Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:58.725Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:34.327Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "AccessTokenManager has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39831", "datePublished": "2024-10-08T03:03:34.327Z", "dateReserved": "2024-07-22T03:22:00.866Z", "dateUpdated": "2024-10-08T14:02:58.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29074 (GCVE-0-2024-29074)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2025-03-12 16:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-29074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:50:19.747805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T16:36:06.271Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:52.042Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Telephony has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-29074", "datePublished": "2024-04-02T06:22:52.042Z", "dateReserved": "2024-03-15T08:05:24.395Z", "dateUpdated": "2025-03-12T16:36:06.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22841 (GCVE-0-2025-22841)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22841", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:22:27.635991Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:22:40.440Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:42.029Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22841", "datePublished": "2025-03-04T03:44:42.029Z", "dateReserved": "2025-01-20T02:01:05.715Z", "dateUpdated": "2025-03-04T14:22:40.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22851 (GCVE-0-2025-22851)
Vulnerability from cvelistv5
Published
2025-04-07 02:35
Modified
2025-04-07 14:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22851", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:20:37.797694Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T14:20:58.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T02:35:39.555Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_A has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22851", "datePublished": "2025-04-07T02:35:39.555Z", "dateReserved": "2025-02-08T01:18:19.559Z", "dateUpdated": "2025-04-07T14:20:58.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20042 (GCVE-0-2025-20042)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:29:57.867914Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:30:17.189Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:27.295Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an out of bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20042", "datePublished": "2025-03-04T03:44:27.295Z", "dateReserved": "2025-01-20T01:59:30.199Z", "dateUpdated": "2025-03-04T14:30:17.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4753 (GCVE-0-2023-4753)
Vulnerability from cvelistv5
Published
2023-09-21 09:16
Modified
2024-08-02 07:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.1", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-11-05T04:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input." } ], "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T07:24:11.326Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "OpenHarmony v3.2.1 and prior version has a system call function usage error", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-4753", "datePublished": "2023-09-21T09:16:56.550Z", "dateReserved": "2023-09-04T07:20:46.438Z", "dateUpdated": "2024-08-02T07:37:59.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41160 (GCVE-0-2024-41160)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:49:51.381121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:50:58.644Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:21.861Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-41160", "datePublished": "2024-09-02T03:25:21.861Z", "dateReserved": "2024-07-22T03:22:00.906Z", "dateUpdated": "2024-09-03T14:50:58.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9978 (GCVE-0-2024-9978)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:22:19.450312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:22:27.509Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:29.123Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-9978", "datePublished": "2024-12-03T12:15:29.123Z", "dateReserved": "2024-10-15T06:17:57.851Z", "dateUpdated": "2024-12-03T14:22:27.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25212 (GCVE-0-2025-25212)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-12 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25212", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T14:28:59.360941Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T14:29:07.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:17.285Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "pasteboard has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25212", "datePublished": "2025-08-11T02:55:17.285Z", "dateReserved": "2025-03-02T07:20:06.690Z", "dateUpdated": "2025-08-12T14:29:07.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-11-03 20:15
Modified
2024-11-21 07:26
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Summary
OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges." }, { "lang": "es", "value": "OpenHarmony-v3.1.2 y versiones anteriores ten\u00edan una vulnerabilidad de Multiple path traversal en los servicios appspawn y nwebspawn. Los atacantes locales pueden crear directorios arbitrarios o escapar de la zona de pruebas de la aplicaci\u00f3n. Si se encadena con otras vulnerabilidades, permitir\u00eda que un proceso sin privilegios obtuviera privilegios completos del root." } ], "id": "CVE-2022-43451", "lastModified": "2024-11-21T07:26:30.713", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-03T20:15:33.867", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:15
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una vulnerabilidad de omisi\u00f3n de permisos. Los atacantes locales pueden omitir el control de permisos y conseguir informaci\u00f3n confidencial" } ], "id": "CVE-2022-38064", "lastModified": "2024-11-21T07:15:42.370", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:13.983", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:29
Severity ?
8.3 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "2976685D-D374-45B2-AC0B-0045B4C19959", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks." }, { "lang": "es", "value": "OpenHarmony-v3.1.4 y versiones anteriores ten\u00edan una vulnerabilidad. El c\u00f3digo PIN se transmite al dispositivo par en texto plano durante la autenticaci\u00f3n entre dispositivos, lo que reduce la dificultad de los ataques de intermediario." } ], "id": "CVE-2022-45877", "lastModified": "2024-11-21T07:29:53.193", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:14.787", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 15:16
Modified
2024-11-21 07:25
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "B80E85F4-B43C-47C4-91AD-CC3C6E9A8DEA", "versionEndExcluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y versiones anteriores, presentan una vulnerabilidad de Falta de comprobaci\u00f3n de permisos en el servicio param del subsistema de inicio. Una aplicaci\u00f3n maliciosa instalada en el dispositivo podr\u00eda elevar sus privilegios a usuario root, deshabilitar las funciones de seguridad o causar DoS deshabilitando determinados servicios" } ], "id": "CVE-2022-42488", "lastModified": "2024-11-21T07:25:03.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T15:16:26.243", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:12
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "8C039CB8-843F-4608-9D51-0723001EFAFB", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "3375114F-F7BC-4D54-8906-461891AF90FD", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una configuraci\u00f3n incorrecta de la biblioteca cJSON, que conlleva a una vulnerabilidad de desbordamiento de pila durante el an\u00e1lisis recursivo. Los atacantes de la LAN pueden conllevar a un ataque DoS a todos los dispositivos de la red" } ], "id": "CVE-2022-36423", "lastModified": "2024-11-21T07:12:58.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:10.757", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:28
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "E808FE2D-D1CB-44EE-9AE4-4A456361B2AA", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-45126", "lastModified": "2024-11-21T07:28:48.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.427", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 15:16
Modified
2024-11-21 07:23
Severity ?
5.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "9883900A-457C-4533-B08F-A34DB70346DA", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y versiones anteriores, 3.0.6 y versiones anteriores, presentan una vulnerabilidad de lectura y escritura de memoria fuera de l\u00edmites en el controlador de dispositivo /dev/mmz_userdev. El impacto depende de los privilegios del atacante. El proceso no privilegiado que es ejecutado en el dispositivo podr\u00eda leer memoria fuera de l\u00edmites, conllevando a una revelaci\u00f3n de informaci\u00f3n confidencial. Los procesos con UID de usuario del sistema que es ejecutadon en el dispositivo podr\u00edan escribir memoria fuera de l\u00edmites, lo que podr\u00eda conllevar a una corrupci\u00f3n de memoria no especificada" } ], "id": "CVE-2022-41686", "lastModified": "2024-11-21T07:23:38.813", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 2.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T15:16:20.347", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:15
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una vulnerabilidad de evasi\u00f3n de permisos. Para aprovechar esta debilidad, los atacantes necesitan otra vulnerabilidad para obtener el sistema" } ], "id": "CVE-2022-38081", "lastModified": "2024-11-21T07:15:44.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:14.270", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:28
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "2976685D-D374-45B2-AC0B-0045B4C19959", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions." }, { "lang": "es", "value": "OpenHarmony-v3.1.2 y versiones anteriores ten\u00edan la vulnerabilidad de que la telefon\u00eda en el subsistema de comunicaci\u00f3n env\u00eda eventos p\u00fablicos con datos personales, pero el permiso no est\u00e1 establecido. Las aplicaciones maliciosas podr\u00edan escuchar eventos p\u00fablicos y obtener informaci\u00f3n como n\u00fameros de m\u00f3viles y datos de SMS sin permisos." } ], "id": "CVE-2022-45118", "lastModified": "2024-11-21T07:28:48.013", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:13.553", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:26
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "E808FE2D-D1CB-44EE-9AE4-4A456361B2AA", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysTimerGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-43662", "lastModified": "2024-11-21T07:26:59.600", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.327", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:23
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "2976685D-D374-45B2-AC0B-0045B4C19959", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGetres. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-41802", "lastModified": "2024-11-21T07:23:52.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:13.357", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:16
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "3375114F-F7BC-4D54-8906-461891AF90FD", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una vulnerabilidad de desbordamiento de pila. Los atacantes locales pueden desencadenar un desbordamiento de pila y conseguir informaci\u00f3n confidencial de la red" } ], "id": "CVE-2022-38701", "lastModified": "2024-11-21T07:16:57.550", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:14.640", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:28
Severity ?
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." }, { "lang": "es", "value": "Se descubri\u00f3 que los servicios appspawn y nwebspawn dentro de OpenHarmony-v3.1.2 y versiones anteriores eran vulnerables a la vulnerabilidad de desbordamiento de b\u00fafer debido a una validaci\u00f3n de entrada insuficiente. Una aplicaci\u00f3n maliciosa sin privilegios podr\u00eda obtener la ejecuci\u00f3n de c\u00f3digo dentro de cualquier aplicaci\u00f3n instalada en el dispositivo o provocar el bloqueo de la aplicaci\u00f3n." } ], "id": "CVE-2022-44455", "lastModified": "2024-11-21T07:28:02.960", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.2, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:13.413", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:16
Severity ?
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | 3.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "898B6356-A629-452D-8D91-1F7DCF011673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.1 y anteriores, presentan una vulnerabilidad de omisi\u00f3n de permisos. Los atacantes locales pueden omitir un control de permisos y conseguir el control del servicio de la c\u00e1mara" } ], "id": "CVE-2022-38700", "lastModified": "2024-11-21T07:16:57.427", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:14.577", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 15:16
Modified
2024-11-21 07:25
Severity ?
8.3 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y versiones anteriores, presentan una vulnerabilidad de omisi\u00f3n de autentificaci\u00f3n en una funci\u00f3n de callback handler de Softbus_server en el subsistema de comunicaci\u00f3n. Los atacantes pueden lanzar ataques en redes distribuidas mediante el env\u00edo de paquetes Bluetooth rfcomm a cualquier dispositivo remoto y ejecutando comandos arbitrarios" } ], "id": "CVE-2022-42463", "lastModified": "2024-11-21T07:25:00.773", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T15:16:24.883", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-03 20:15
Modified
2024-11-21 07:26
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000." }, { "lang": "es", "value": "OpenHarmony-v3.1.2 y versiones anteriores ten\u00edan una vulnerabilidad de lectura de archivos arbitraria a trav\u00e9s del servidor de descarga. Los atacantes locales pueden instalar una aplicaci\u00f3n maliciosa en el dispositivo y revelar cualquier archivo del sistema de archivos al que pueda acceder el servicio download_server que se ejecuta con UID 1000." } ], "id": "CVE-2022-43449", "lastModified": "2024-11-21T07:26:30.443", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-03T20:15:33.527", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 15:16
Modified
2024-11-21 07:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F276BBF-B42F-41CC-8E94-158003441CCA", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y versiones anteriores, 3.0.6 y versiones anteriores, presentan una vulnerabilidad de anulaci\u00f3n del pool de memoria del Kernel en el controlador de dispositivo /dev/mmz_userdev. El impacto depende de los privilegios del atacante. El proceso no privilegiado que sea ejecutado en el dispositivo podr\u00eda divulgar informaci\u00f3n confidencial, incluyendo el puntero del kernel, que podr\u00eda ser usado en otros ataques. Los procesos con UID de usuario del sistema que es ejecutado en el dispositivo podr\u00edan mmap pools de memoria usados por el kernel y anularlos, lo que podr\u00eda usarse para obtener una ejecuci\u00f3n de c\u00f3digo del kernel en el dispositivo, obtener privilegios de root o causar el reinicio del dispositivo" } ], "id": "CVE-2022-42464", "lastModified": "2024-11-21T07:25:00.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T15:16:25.617", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-03 20:15
Modified
2024-11-21 07:26
Severity ?
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot." }, { "lang": "es", "value": "OpenHarmony-v3.1.2 y versiones anteriores ten\u00edan una vulnerabilidad de DOS en distributedhardware_device_manager al unirse a una red. Los atacantes de red pueden enviar un paquete anormal al unirse a una red, provocar una referencia nullptr y reiniciar el dispositivo." } ], "id": "CVE-2022-43495", "lastModified": "2024-11-21T07:26:36.103", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-03T20:15:34.027", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }