Vulnerabilites related to openatom - openharmony
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:14
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores, se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-27132", "lastModified": "2025-05-09T19:14:30.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:25.300", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:24
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local lea y escriba archivos arbitrarios mediante la preservaci\u00f3n inadecuada de los permisos." } ], "id": "CVE-2023-43612", "lastModified": "2024-11-21T08:24:27.890", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:08.323", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:55
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions
allow an adjacent attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "1E7BF175-F661-43C6-951C-E6F5D62374B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free." }, { "lang": "es", "value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante adyacente ejecute c\u00f3digo arbitrario en cualquier aplicaci\u00f3n mediante un use after free." } ], "id": "CVE-2024-21860", "lastModified": "2024-11-21T08:55:07.907", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:11.530", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-02 19:12
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input." }, { "lang": "es", "value": "En OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en cualquier aplicaci\u00f3n mediante una entrada incorrecta." } ], "id": "CVE-2024-29074", "lastModified": "2025-01-02T19:12:32.683", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:45.207", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:39
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "id": "CVE-2025-24925", "lastModified": "2025-08-12T16:39:10.993", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:34.433", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una confusi\u00f3n de tipos." } ], "id": "CVE-2025-27536", "lastModified": "2025-08-12T16:38:29.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:39.830", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:16
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-24309", "lastModified": "2025-03-04T17:16:06.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.940", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "id": "CVE-2025-27562", "lastModified": "2025-08-12T16:38:21.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:40.610", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-03 13:15
Modified
2024-12-11 17:12
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BB26E75-1DE2-4EF3-8294-78872BE1A4A5", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "en OpenHarmony v4.0.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-12082", "lastModified": "2024-12-11T17:12:56.793", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-03T13:15:04.843", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-04 07:15
Modified
2024-12-16 20:00
Severity ?
4.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque la fuga de informaci\u00f3n confidencial a trav\u00e9s de un almacenamiento inseguro." } ], "id": "CVE-2024-21826", "lastModified": "2024-12-16T20:00:03.550", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-04T07:15:10.380", "references": [ { "source": "scy@openharmony.io", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-922" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 19:12
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "162C2405-E867-4928-8FF2-BF0E5C93D920", "versionEndIncluding": "5.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-20021", "lastModified": "2025-03-04T19:12:58.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:12.703", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-10 11:15
Modified
2024-11-21 07:50
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9346515D-01CC-45A7-8230-E40B8EA89ADF", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions\u00a0has a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.\n" } ], "id": "CVE-2023-25947", "lastModified": "2024-11-21T07:50:29.843", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-10T11:15:12.377", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:40
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "OpenHarmony v5.0.2 y anteriores permiten a un atacante local la ejecuci\u00f3n arbitraria de c\u00f3digo en aplicaciones preinstaladas a trav\u00e9s de un uso de memoria despu\u00e9s de liberarla. Esta vulnerabilidad s\u00f3lo puede ser explotada en escenarios restringidos." } ], "id": "CVE-2025-23409", "lastModified": "2025-03-04T17:40:38.997", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.240", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-02 08:15
Modified
2024-11-21 08:29
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources\n\n" }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local haga que DOS ocupe todos los recursos" } ], "id": "CVE-2023-47216", "lastModified": "2024-11-21T08:29:58.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T08:15:09.077", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 17:12
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local provoque un bloqueo a trav\u00e9s de un desbordamiento de enteros." } ], "id": "CVE-2024-28044", "lastModified": "2024-09-04T17:12:54.973", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:15.380", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:14
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-23418", "lastModified": "2025-03-04T17:14:49.393", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.523", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:07
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n." } ], "id": "CVE-2025-24493", "lastModified": "2025-06-09T19:07:08.100", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:21.763", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:23
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local obtenga informaci\u00f3n confidencial a trav\u00e9s de permisos predeterminados incorrectos." } ], "id": "CVE-2023-42774", "lastModified": "2024-11-21T08:23:08.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:08.157", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "id": "CVE-2025-25217", "lastModified": "2025-06-09T19:07:00.530", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:21.933", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 16:30
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas a trav\u00e9s de escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-39816", "lastModified": "2024-09-04T16:30:42.197", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:16.343", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-04 07:15
Modified
2024-12-16 20:03
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCD533F2-0FE4-466C-8928-693658838C2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions." }, { "lang": "es", "value": "OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n mediante la conservaci\u00f3n inadecuada de los permisos." } ], "id": "CVE-2024-21816", "lastModified": "2024-12-16T20:03:26.960", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-04T07:15:09.743", "references": [ { "source": "scy@openharmony.io", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:36
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "3EB94C88-3DA9-4A6C-B8CA-EBA06D8405CB", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" }, { "lang": "es", "value": "platform_callback_stub en el subsistema miscel\u00e1neo dentro de OpenHarmony-v3.0.5 y versiones anteriores tiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que permite un \"SA relay attack\". Los atacantes locales pueden omitir la autenticaci\u00f3n y atacar a otras SA con altos privilegios." } ], "id": "CVE-2023-0036", "lastModified": "2024-11-21T07:36:26.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.580", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 19:10
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "5570397D-1B1E-4BE4-99D5-825B6B0886B9", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-20081", "lastModified": "2025-03-04T19:10:41.293", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.120", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un ataque DOS mediante lecturas fuera de los l\u00edmites." } ], "id": "CVE-2025-23235", "lastModified": "2025-06-09T19:07:15.063", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:21.590", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-27 18:01
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3", "versionEndIncluding": "4.0", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante remoto cause DOS mediante una entrada incorrecta." } ], "id": "CVE-2024-28226", "lastModified": "2025-01-27T18:01:43.667", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:44.840", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-24 16:25
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:-:*:*:-:*:*:*", "matchCriteriaId": "0E24BA59-D8E5-438B-A046-3CF5CA940833", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. " } ], "id": "CVE-2024-28951", "lastModified": "2025-01-24T16:25:21.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:45.030", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-03 13:15
Modified
2024-12-11 03:51
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A2185B-B1A3-4D0F-92FA-A60DB0D3B1FB", "versionEndIncluding": "4.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." }, { "lang": "es", "value": "en OpenHarmony v4.1.1 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a root mediante el uso use after free." } ], "id": "CVE-2024-10074", "lastModified": "2024-12-11T03:51:27.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-03T13:15:04.490", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:39
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "id": "CVE-2025-24844", "lastModified": "2025-08-12T16:39:21.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:34.217", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 16:56
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas a trav\u00e9s de escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-38386", "lastModified": "2024-09-04T16:56:41.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:15.783", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 04:15
Modified
2024-10-16 17:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." }, { "lang": "es", "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque un DOS por p\u00e9rdida de memoria." } ], "id": "CVE-2024-43696", "lastModified": "2024-10-16T17:38:48.517", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T04:15:07.680", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:03
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en TCB mediante use after free." } ], "id": "CVE-2024-3759", "lastModified": "2025-01-02T19:03:20.700", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:50.023", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:21
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante remoto la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante lectura y escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-36243", "lastModified": "2024-11-21T09:21:55.770", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.3, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:18.323", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 19:12
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "5570397D-1B1E-4BE4-99D5-825B6B0886B9", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante un desbordamiento de enteros. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-20024", "lastModified": "2025-03-04T19:12:22.553", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:12.840", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:55
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "1E7BF175-F661-43C6-951C-E6F5D62374B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." }, { "lang": "es", "value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque un desbordamiento en la regi\u00f3n Heap a trav\u00e9s de un desbordamiento de enteros." } ], "id": "CVE-2024-21851", "lastModified": "2024-11-21T08:55:07.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:11.070", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-02 08:15
Modified
2024-11-21 08:32
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque una falla del audio multimedia al modificar un puntero liberado." } ], "id": "CVE-2023-49142", "lastModified": "2024-11-21T08:32:55.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T08:15:10.123", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:12
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "8C039CB8-843F-4608-9D51-0723001EFAFB", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "3375114F-F7BC-4D54-8906-461891AF90FD", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una configuraci\u00f3n incorrecta de la biblioteca cJSON, que conlleva a una vulnerabilidad de desbordamiento de pila durante el an\u00e1lisis recursivo. Los atacantes de la LAN pueden conllevar a un ataque DoS a todos los dispositivos de la red" } ], "id": "CVE-2022-36423", "lastModified": "2024-11-21T07:12:58.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:10.757", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-27 17:58
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3", "versionEndIncluding": "4.0", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free." }, { "lang": "es", "value": "OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local cause DOS mediante use after free." } ], "id": "CVE-2024-22180", "lastModified": "2025-01-27T17:58:03.073", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:42.340", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-07 10:15
Modified
2025-02-11 17:25
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "027A2297-6F9B-4CB9-A126-56825CCC14BA", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v4.1.2 y versiones anteriores, se permite que un atacante local haga que el permiso com\u00fan se actualice a superusuario y se filtre informaci\u00f3n confidencial a trav\u00e9s de un desbordamiento de b\u00fafer." } ], "id": "CVE-2025-0303", "lastModified": "2025-02-11T17:25:01.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-07T10:15:11.410", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:21
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante remoto la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-36260", "lastModified": "2024-11-21T09:21:56.977", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.3, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:18.557", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en tcb a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n." } ], "id": "CVE-2025-25278", "lastModified": "2025-08-12T16:38:55.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:34.920", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-10 11:15
Modified
2024-11-21 07:47
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions
has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "A6890018-CA05-41A8-B061-19B45BFD5281", "versionEndIncluding": "3.0.7", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9346515D-01CC-45A7-8230-E40B8EA89ADF", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions\n\nhas a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause the current application to crash.\n" } ], "id": "CVE-2023-24465", "lastModified": "2024-11-21T07:47:54.987", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-10T11:15:12.300", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." }, { "lang": "es", "value": "Un atacante local podr\u00eda provocar una denegaci\u00f3n de servicio en OpenHarmony v5.0.2 y anteriores desreferenciando un puntero nulo." } ], "id": "CVE-2025-22837", "lastModified": "2025-03-04T17:38:12.983", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.387", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:06
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta." } ], "id": "CVE-2025-27242", "lastModified": "2025-06-09T19:06:09.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:22.583", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:55
Severity ?
4.7 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "1E7BF175-F661-43C6-951C-E6F5D62374B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." }, { "lang": "es", "value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local cause DOS mediante una entrada incorrecta." } ], "id": "CVE-2024-21863", "lastModified": "2024-11-21T08:55:08.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:12.067", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 19:08
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "5570397D-1B1E-4BE4-99D5-825B6B0886B9", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "id": "CVE-2025-20011", "lastModified": "2025-03-04T19:08:08.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:12.563", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:39
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "Las versiones OpenHarmony v5.0.2 y anteriores permiten a un atacante local provocar una denegaci\u00f3n de servicio a trav\u00e9s de una lectura fuera de l\u00edmites." } ], "id": "CVE-2025-22847", "lastModified": "2025-03-04T17:39:25.643", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.663", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:39
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en tcb mediante el use after free." } ], "id": "CVE-2025-24298", "lastModified": "2025-08-12T16:39:29.253", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:33.440", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en tcb mediante el use after free." } ], "id": "CVE-2025-27128", "lastModified": "2025-08-12T16:38:39.677", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:39.247", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-27 18:00
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3", "versionEndIncluding": "4.0", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write." }, { "lang": "es", "value": "OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-24581", "lastModified": "2025-01-27T18:00:59.000", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:42.560", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:04
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en TCB a trav\u00e9s de un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico." } ], "id": "CVE-2024-3758", "lastModified": "2025-01-02T19:04:15.777", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:49.497", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-05 08:15
Modified
2024-11-06 15:25
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free." }, { "lang": "es", "value": " en OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a root y se filtre informaci\u00f3n confidencial a trav\u00e9s de una doble liberaci\u00f3n." } ], "id": "CVE-2024-47404", "lastModified": "2024-11-06T15:25:24.887", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-05T08:15:03.500", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:32
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" }, { "lang": "es", "value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de lectura fuera de los l\u00edmites." } ], "id": "CVE-2023-49118", "lastModified": "2024-11-21T08:32:52.223", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:09.600", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 04:15
Modified
2024-10-16 16:49
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-39806", "lastModified": "2024-10-16T16:49:41.507", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T04:15:07.183", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-21089", "lastModified": "2025-03-06T18:07:19.917", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.680", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:07
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-20091", "lastModified": "2025-03-06T18:07:00.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.253", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:40
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "OpenHarmony v5.0.2 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n arbitraria de c\u00f3digo en aplicaciones preinstaladas a trav\u00e9s de una escritura fuera de l\u00edmites. Esta vulnerabilidad s\u00f3lo puede ser explotada en escenarios restringidos." } ], "id": "CVE-2025-23240", "lastModified": "2025-03-04T17:40:18.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.097", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:14
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-23414", "lastModified": "2025-03-04T17:14:10.130", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.377", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:15
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-24301", "lastModified": "2025-03-04T17:15:48.160", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.803", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-02 19:12
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow." }, { "lang": "es", "value": "En OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de pila." } ], "id": "CVE-2024-29086", "lastModified": "2025-01-02T19:12:16.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:45.397", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-05 08:15
Modified
2024-11-06 15:26
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "en OpenHarmony v4.0.0 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de lectura fuera de los l\u00edmites." } ], "id": "CVE-2024-47402", "lastModified": "2024-11-06T15:26:23.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-05T08:15:03.250", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:24
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9070D0D2-7962-4C4E-9159-28A16DD4EC75", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" }, { "lang": "es", "value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de lectura fuera de los l\u00edmites." } ], "id": "CVE-2023-43756", "lastModified": "2024-11-21T08:24:43.483", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:08.890", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:36
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "3EB94C88-3DA9-4A6C-B8CA-EBA06D8405CB", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" }, { "lang": "es", "value": "softbus_client_stub en el subsistema de comunicaci\u00f3n dentro de OpenHarmony-v3.0.5 y versiones anteriores tiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que permite un \"SA relay attack\". Los atacantes locales pueden omitir la autenticaci\u00f3n y atacar a otras SA con altos privilegios." } ], "id": "CVE-2023-0035", "lastModified": "2024-11-21T07:36:26.143", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.503", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-10 11:15
Modified
2024-11-21 07:44
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an
arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CD89B217-1A7D-485D-B647-5C666FBA5D46", "versionEndIncluding": "3.1.5", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\narbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.\n" } ], "id": "CVE-2023-22301", "lastModified": "2024-11-21T07:44:29.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-10T11:15:12.127", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-21 10:15
Modified
2024-11-21 08:35
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "ECDF52EE-DD69-4F63-B4B9-5034CAD711B4", "versionEndIncluding": "3.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input." }, { "lang": "es", "value": "OpenHarmony v3.2.1 y versiones anteriores tienen un error de uso de la funci\u00f3n de llamada al sistema. Los atacantes locales pueden bloquear el kernel debido a la entrada de error." } ], "id": "CVE-2023-4753", "lastModified": "2024-11-21T08:35:54.307", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-21T10:15:09.597", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 16:38
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:-:*:*:-:*:*:*", "matchCriteriaId": "0E24BA59-D8E5-438B-A046-3CF5CA940833", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:beta1:*:*:-:*:*:*", "matchCriteriaId": "393080A6-2550-4D36-8742-9411A5317C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:beta2:*:*:-:*:*:*", "matchCriteriaId": "102B818B-D0A3-4156-B33D-08773C198611", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0.1:*:*:*:-:*:*:*", "matchCriteriaId": "5373D25A-1082-4CA4-A874-E71B07DC22EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "en OpenHarmony v4.0.0 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-39612", "lastModified": "2024-09-04T16:38:56.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:15.967", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 20:41
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-20626", "lastModified": "2025-03-04T20:41:19.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.393", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-02 08:15
Modified
2024-11-21 08:32
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque la ca\u00edda del reproductor multimedia modificando un puntero liberado." } ], "id": "CVE-2023-49135", "lastModified": "2024-11-21T08:32:54.467", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T08:15:09.927", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:05
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio a trav\u00e9s de un desbordamiento de enteros." } ], "id": "CVE-2024-3757", "lastModified": "2025-01-02T19:05:19.333", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:49.223", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:14
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "id": "CVE-2025-27241", "lastModified": "2025-05-09T19:14:21.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:25.490", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 04:15
Modified
2024-10-16 17:43
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." }, { "lang": "es", "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-45382", "lastModified": "2024-10-16T17:43:43.917", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T04:15:08.873", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:06
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u00a0through improper input." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta." } ], "id": "CVE-2025-27131", "lastModified": "2025-06-09T19:06:16.757", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:22.423", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:04
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio mediante la desreferencia del puntero NULL." } ], "id": "CVE-2024-31078", "lastModified": "2025-01-02T19:04:58.017", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:48.943", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 16:30
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB1039E0-0E86-40F4-96FB-52DC3384E36C", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a superusuario y se filtre informaci\u00f3n confidencial mediante use after free. " } ], "id": "CVE-2024-41157", "lastModified": "2024-09-04T16:30:40.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:16.740", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:05
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "id": "CVE-2025-27563", "lastModified": "2025-06-09T19:05:03.483", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:22.917", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:28
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "E808FE2D-D1CB-44EE-9AE4-4A456361B2AA", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-45126", "lastModified": "2024-11-21T07:28:48.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.427", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:06
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "id": "CVE-2025-25218", "lastModified": "2025-05-09T19:06:17.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:25.137", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:08
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-22443", "lastModified": "2025-03-06T18:08:17.313", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.097", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 15:16
Modified
2024-11-21 07:23
Severity ?
5.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "9883900A-457C-4533-B08F-A34DB70346DA", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y versiones anteriores, 3.0.6 y versiones anteriores, presentan una vulnerabilidad de lectura y escritura de memoria fuera de l\u00edmites en el controlador de dispositivo /dev/mmz_userdev. El impacto depende de los privilegios del atacante. El proceso no privilegiado que es ejecutado en el dispositivo podr\u00eda leer memoria fuera de l\u00edmites, conllevando a una revelaci\u00f3n de informaci\u00f3n confidencial. Los procesos con UID de usuario del sistema que es ejecutadon en el dispositivo podr\u00edan escribir memoria fuera de l\u00edmites, lo que podr\u00eda conllevar a una corrupci\u00f3n de memoria no especificada" } ], "id": "CVE-2022-41686", "lastModified": "2024-11-21T07:23:38.813", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 2.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T15:16:20.347", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:05
Severity ?
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "id": "CVE-2025-27247", "lastModified": "2025-06-09T19:05:57.987", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" } ] }, "published": "2025-06-08T12:15:22.733", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:21
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque que las aplicaciones fallen debido a confusi\u00f3n de tipos." } ], "id": "CVE-2024-36278", "lastModified": "2024-11-21T09:21:58.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:18.757", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1417C255-3160-4BAC-A56A-1385F871F09B", "versionEndIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9E1C17A4-85B4-4B19-8AFB-1FAA62AA363B", "versionEndIncluding": "5.0.3", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores permiten que un atacante local provoque un DOS a trav\u00e9s de un desbordamiento del b\u00fafer." } ], "id": "CVE-2025-25052", "lastModified": "2025-05-09T19:07:18.690", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:24.967", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-09 03:15
Modified
2024-11-21 07:26
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "E808FE2D-D1CB-44EE-9AE4-4A456361B2AA", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysTimerGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-43662", "lastModified": "2024-11-21T07:26:59.600", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T03:15:09.327", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-03 13:15
Modified
2024-12-11 17:20
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A2185B-B1A3-4D0F-92FA-A60DB0D3B1FB", "versionEndIncluding": "4.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "en OpenHarmony v4.1.1 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-9978", "lastModified": "2024-12-11T17:20:04.517", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-03T13:15:05.140", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-11 18:07
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C966863-694A-487F-9510-880F7796AC08", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante un desbordamiento de enteros. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-0587", "lastModified": "2025-03-11T18:07:22.823", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:11.240", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-22841", "lastModified": "2025-03-04T17:38:56.780", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.530", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-02 19:12
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque que las aplicaciones fallen al obtener permiso." } ], "id": "CVE-2024-22177", "lastModified": "2025-01-02T19:12:43.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:42.130", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:14
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "id": "CVE-2025-27248", "lastModified": "2025-05-09T19:14:06.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:25.657", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-06 09:15
Modified
2025-05-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "id": "CVE-2025-22886", "lastModified": "2025-05-09T19:07:46.473", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-06T09:15:24.777", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-05 08:15
Modified
2024-11-06 15:26
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." }, { "lang": "es", "value": " en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local haga que el permiso com\u00fan se actualice a root y se filtre informaci\u00f3n confidencial mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-47137", "lastModified": "2024-11-06T15:26:35.547", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-05T08:15:02.830", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos." } ], "id": "CVE-2025-20063", "lastModified": "2025-06-09T19:07:27.137", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:20.493", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-02 19:13
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque que las aplicaciones fallen debido a confusi\u00f3n de tipos." } ], "id": "CVE-2024-21834", "lastModified": "2025-01-02T19:13:29.017", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:41.410", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:23
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "2976685D-D374-45B2-AC0B-0045B4C19959", "versionEndIncluding": "3.1.4", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "E12F0A2B-8CE1-43F6-8D91-C3047871E8E2", "versionEndIncluding": "1.1.5", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." }, { "lang": "es", "value": "El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGetres. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente en el espacio del usuario y se filtran." } ], "id": "CVE-2022-41802", "lastModified": "2024-11-21T07:23:52.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:13.357", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "id": "CVE-2025-26690", "lastModified": "2025-08-12T16:38:47.920", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:35.670", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:42
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante la desreferencia del puntero NULL. Esta vulnerabilidad puede explotarse solo en escenarios restringidos." } ], "id": "CVE-2025-21084", "lastModified": "2025-03-04T17:42:20.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.537", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de la desreferencia del puntero NULL." } ], "id": "CVE-2025-21097", "lastModified": "2025-03-06T18:07:39.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.813", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-09 15:15
Modified
2024-11-21 07:16
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "matchCriteriaId": "3375114F-F7BC-4D54-8906-461891AF90FD", "versionEndIncluding": "3.0.5", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "1851DC7A-A8D5-46D9-BC51-ED8152B8F345", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." }, { "lang": "es", "value": "OpenHarmony versiones v3.1.2 y anteriores, presentan una vulnerabilidad de desbordamiento de pila. Los atacantes locales pueden desencadenar un desbordamiento de pila y conseguir informaci\u00f3n confidencial de la red" } ], "id": "CVE-2022-38701", "lastModified": "2024-11-21T07:16:57.550", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T15:15:14.640", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:23
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante remoto la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-37185", "lastModified": "2024-11-21T09:23:22.897", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.3, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:19.353", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 19:11
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "5570397D-1B1E-4BE4-99D5-825B6B0886B9", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read." }, { "lang": "es", "value": "OpenHarmony v5.0.2 y anteriores permiten a un atacante local ocasionar una fuga de informaci\u00f3n a trav\u00e9s de una lectura fuera de l\u00edmites." } ], "id": "CVE-2025-20042", "lastModified": "2025-03-04T19:11:26.743", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:12.970", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-02 19:12
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E094EF3-139A-4F6A-828C-162D6203E3E7", "versionEndIncluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en cualquier aplicaci\u00f3n mediante el use after free." } ], "id": "CVE-2024-22098", "lastModified": "2025-01-02T19:12:54.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:41.927", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:43
Severity ?
5.9 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en aplicaciones preinstaladas mediante confusi\u00f3n de tipos." } ], "id": "CVE-2023-6045", "lastModified": "2024-11-21T08:43:02.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:09.387", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 04:15
Modified
2024-10-16 17:42
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." }, { "lang": "es", "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque un ataque de denegaci\u00f3n de servicio (DOS) mediante una entrada incorrecta." } ], "id": "CVE-2024-43697", "lastModified": "2024-10-16T17:42:54.640", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T04:15:07.913", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-10 11:15
Modified
2024-11-21 07:36
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions,
OpenHarmony-v3.0.7 and prior versions
has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "A6890018-CA05-41A8-B061-19B45BFD5281", "versionEndIncluding": "3.0.7", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CD89B217-1A7D-485D-B647-5C666FBA5D46", "versionEndIncluding": "3.1.5", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, \n\nOpenHarmony-v3.0.7 and prior versions\n\nhas an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.\n" } ], "id": "CVE-2023-0083", "lastModified": "2024-11-21T07:36:31.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-10T11:15:11.117", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:08
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read bypass permission check.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through\u00a0out-of-bounds read bypass permission check." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local cause fugas de informaci\u00f3n al omitir la verificaci\u00f3n de permisos de lectura fuera de los l\u00edmites." } ], "id": "CVE-2025-21098", "lastModified": "2025-03-06T18:08:03.217", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:13.953", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:39
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante una entrada incorrecta." } ], "id": "CVE-2025-25212", "lastModified": "2025-08-12T16:39:03.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:34.600", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 16:34
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores, permitir que un atacante remoto provoque fuga de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-39775", "lastModified": "2024-09-04T16:34:51.113", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:16.160", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:29
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque DOS a trav\u00e9s de un desbordamiento del b\u00fafer." } ], "id": "CVE-2023-47217", "lastModified": "2024-11-21T08:29:58.547", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:08.990", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-04 07:15
Modified
2024-12-16 19:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en cualquier aplicaci\u00f3n mediante el use after free." } ], "id": "CVE-2023-46708", "lastModified": "2024-12-16T19:58:19.333", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-04T07:15:08.100", "references": [ { "source": "scy@openharmony.io", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:55
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "1E7BF175-F661-43C6-951C-E6F5D62374B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." }, { "lang": "es", "value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque un desbordamiento en la regi\u00f3n Heap a trav\u00e9s de un desbordamiento de enteros." } ], "id": "CVE-2024-21845", "lastModified": "2024-11-21T08:55:06.673", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:10.633", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:06
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free. " } ], "id": "CVE-2024-27217", "lastModified": "2025-01-02T19:06:49.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:48.660", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:23
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante remoto la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free." } ], "id": "CVE-2024-37030", "lastModified": "2024-11-21T09:23:04.790", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.3, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:18.963", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-09 12:21
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md | Permissions Required |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." }, { "lang": "es", "value": "en OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a superusuario y se filtre informaci\u00f3n confidencial mediante use after free." } ], "id": "CVE-2024-41160", "lastModified": "2024-09-09T12:21:53.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:16.923", "references": [ { "source": "scy@openharmony.io", "tags": [ "Permissions Required" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:27
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local obtenga informaci\u00f3n confidencial del b\u00fafer mediante el uso de recursos no inicializados." } ], "id": "CVE-2023-46100", "lastModified": "2024-11-21T08:27:53.973", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:08.550", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-02 08:15
Modified
2024-11-21 08:30
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque el bloqueo de la c\u00e1mara multimedia modificando un puntero liberado." } ], "id": "CVE-2023-47857", "lastModified": "2024-11-21T08:30:55.387", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T08:15:09.480", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:46
Severity ?
4.7 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * | |
openatom | openharmony | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "1E7BF175-F661-43C6-951C-E6F5D62374B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." }, { "lang": "es", "value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local cause DOS mediante una entrada incorrecta." } ], "id": "CVE-2024-0285", "lastModified": "2024-11-21T08:46:13.907", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:09.980", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:23
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante remoto la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-37077", "lastModified": "2024-11-21T09:23:08.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.3, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:19.157", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:06
Severity ?
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "id": "CVE-2025-26691", "lastModified": "2025-06-09T19:06:52.933", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" } ] }, "published": "2025-06-08T12:15:22.093", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-08 16:15
Modified
2024-11-21 07:28
Severity ?
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openharmony | openharmony | * | |
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "C026D184-A8AE-4DE6-A339-EA4469DDD4E7", "versionEndIncluding": "3.1.2", "versionStartIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*", "matchCriteriaId": "DD78C0F7-A817-473C-88B3-E7BC1A640AB5", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." }, { "lang": "es", "value": "Se descubri\u00f3 que los servicios appspawn y nwebspawn dentro de OpenHarmony-v3.1.2 y versiones anteriores eran vulnerables a la vulnerabilidad de desbordamiento de b\u00fafer debido a una validaci\u00f3n de entrada insuficiente. Una aplicaci\u00f3n maliciosa sin privilegios podr\u00eda obtener la ejecuci\u00f3n de c\u00f3digo dentro de cualquier aplicaci\u00f3n instalada en el dispositivo o provocar el bloqueo de la aplicaci\u00f3n." } ], "id": "CVE-2022-44455", "lastModified": "2024-11-21T07:28:02.960", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.2, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-08T16:15:13.413", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos." } ], "id": "CVE-2025-21082", "lastModified": "2025-06-09T19:07:20.283", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:21.433", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:40
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de b\u00fafer." } ], "id": "CVE-2025-23234", "lastModified": "2025-03-04T17:40:00.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.953", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-06 18:08
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-22835", "lastModified": "2025-03-06T18:08:28.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.250", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-08 12:15
Modified
2025-06-09 19:06
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "id": "CVE-2025-26693", "lastModified": "2025-06-09T19:06:44.900", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-08T12:15:22.260", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:15
Severity ?
3.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "id": "CVE-2025-23420", "lastModified": "2025-03-04T17:15:27.643", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:15.657", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-02 09:15
Modified
2024-11-21 09:12
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CCBB689E-DAAB-4966-AA0E-60398C10F625", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque que las aplicaciones fallen debido a confusi\u00f3n de tipos." } ], "id": "CVE-2024-31071", "lastModified": "2024-11-21T09:12:47.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-02T09:15:18.087", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-11 04:15
Modified
2025-08-12 16:38
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." }, { "lang": "es", "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en tcb a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n." } ], "id": "CVE-2025-27577", "lastModified": "2025-08-12T16:38:11.867", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-11T04:15:40.770", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-05 08:15
Modified
2024-11-06 15:24
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6304CD6F-CBB6-4B5A-A555-3161F8CDDD35", "versionEndIncluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." }, { "lang": "es", "value": " en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local haga que el permiso com\u00fan se actualice a root y se filtre informaci\u00f3n confidencial mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2024-47797", "lastModified": "2024-11-06T15:24:53.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-05T08:15:03.730", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:29
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n del sistema a trav\u00e9s de confusi\u00f3n de tipos." } ], "id": "CVE-2023-46705", "lastModified": "2024-11-21T08:29:07.240", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:08.800", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-04 07:15
Modified
2024-12-16 19:50
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de lectura fuera de los l\u00edmites." } ], "id": "CVE-2023-25176", "lastModified": "2024-12-16T19:50:09.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-04T07:15:06.387", "references": [ { "source": "scy@openharmony.io", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-07 10:15
Modified
2025-02-11 17:25
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "027A2297-6F9B-4CB9-A126-56825CCC14BA", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow." }, { "lang": "es", "value": "En OpenHarmony v4.1.2 y versiones anteriores, se permite que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de enteros." } ], "id": "CVE-2025-0302", "lastModified": "2025-02-11T17:25:36.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-07T10:15:11.203", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 04:15
Modified
2025-03-04 17:39
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037", "versionEndIncluding": "5.0.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." }, { "lang": "es", "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de b\u00fafer." } ], "id": "CVE-2025-22897", "lastModified": "2025-03-04T17:39:48.960", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T04:15:14.807", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-02 07:15
Modified
2024-11-21 08:27
Severity ?
4.2 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9BB7FE14-3FB6-402C-9F39-EA560E4DC12C", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n" }, { "lang": "es", "value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante adyacente ejecute c\u00f3digo arbitrario mediante escritura fuera de los l\u00edmites." } ], "id": "CVE-2023-45734", "lastModified": "2024-11-21T08:27:16.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-02T07:15:09.267", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-04 07:15
Modified
2024-12-16 19:59
Severity ?
2.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque que las aplicaciones fallen debido a confusi\u00f3n de tipos." } ], "id": "CVE-2023-49602", "lastModified": "2024-12-16T19:59:21.097", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-04T07:15:08.780", "references": [ { "source": "scy@openharmony.io", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-843" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-07 10:15
Modified
2025-02-11 17:24
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "027A2297-6F9B-4CB9-A126-56825CCC14BA", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.1.2 y versiones anteriores, se permite que un atacante local haga que el permiso com\u00fan se actualice a superusuario y se filtre informaci\u00f3n confidencial mediante el use after free." } ], "id": "CVE-2025-0304", "lastModified": "2025-02-11T17:24:47.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-07T10:15:11.587", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 12:15
Modified
2024-11-21 08:16
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local obtenga informaci\u00f3n confidencial o reescriba archivos confidenciales mediante permisos predeterminados incorrectos." } ], "id": "CVE-2023-3116", "lastModified": "2024-11-21T08:16:29.733", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.7, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-20T12:15:07.887", "references": [ { "source": "scy@openharmony.io", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-02 05:15
Modified
2024-09-04 17:10
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0 | |
openatom | openharmony | 4.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:-:*:*:-:*:*:*", "matchCriteriaId": "0E24BA59-D8E5-438B-A046-3CF5CA940833", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:beta1:*:*:-:*:*:*", "matchCriteriaId": "393080A6-2550-4D36-8742-9411A5317C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0:beta2:*:*:-:*:*:*", "matchCriteriaId": "102B818B-D0A3-4156-B33D-08773C198611", "vulnerable": true }, { "criteria": "cpe:2.3:o:openatom:openharmony:4.0.1:*:*:*:-:*:*:*", "matchCriteriaId": "5373D25A-1082-4CA4-A874-E71B07DC22EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." }, { "lang": "es", "value": "en OpenHarmony v4.0.0 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "id": "CVE-2024-38382", "lastModified": "2024-09-04T17:10:56.497", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-02T05:15:15.590", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-922" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-08 04:15
Modified
2024-10-16 16:53
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
References
▼ | URL | Tags | |
---|---|---|---|
scy@openharmony.io | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "C43F6127-00AC-4B67-BAD1-1BD83115DB21", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." }, { "lang": "es", "value": "En OpenHarmony v4.1.0 se permite a un atacante local con altos privilegios la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free." } ], "id": "CVE-2024-39831", "lastModified": "2024-10-16T16:53:00.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-08T04:15:07.447", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-10 11:15
Modified
2024-11-21 07:44
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "CD89B217-1A7D-485D-B647-5C666FBA5D46", "versionEndIncluding": "3.1.5", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\nUAF\u00a0vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.\n" } ], "id": "CVE-2023-22436", "lastModified": "2024-11-21T07:44:48.087", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-10T11:15:12.220", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-02 08:15
Modified
2024-11-21 08:31
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", "matchCriteriaId": "9B6317C3-C255-41DD-AC2D-392EFD95D3E9", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." }, { "lang": "es", "value": "En OpenHarmony v3.2.2 y versiones anteriores permiten que un atacante local provoque la ca\u00edda del reproductor multimedia modificando un puntero liberado." } ], "id": "CVE-2023-48360", "lastModified": "2024-11-21T08:31:33.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-02T08:15:09.707", "references": [ { "source": "scy@openharmony.io", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 07:15
Modified
2025-01-27 17:54
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
Summary
in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action." }, { "lang": "es", "value": "OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante remoto omita la verificaci\u00f3n de permisos para instalar aplicaciones, aunque estas requieren la acci\u00f3n del usuario." } ], "id": "CVE-2024-22092", "lastModified": "2025-01-27T17:54:44.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-02T07:15:41.700", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-07 07:15
Modified
2025-01-02 19:07
Severity ?
5.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openatom | openharmony | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", "matchCriteriaId": "6158D1DE-970C-4AFB-A637-3F65E453B196", "versionEndExcluding": "4.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." }, { "lang": "es", "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free o provocan DOS mediante la desreferencia del puntero NULL." } ], "id": "CVE-2024-23808", "lastModified": "2025-01-02T19:07:39.450", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 2.7, "source": "scy@openharmony.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-07T07:15:48.243", "references": [ { "source": "scy@openharmony.io", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "sourceIdentifier": "scy@openharmony.io", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-476" } ], "source": "scy@openharmony.io", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-45126 (GCVE-0-2022-45126)
Vulnerability from cvelistv5
Published
2023-01-09 02:22
Modified
2025-04-09 13:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 < Version: 3.0.0 < Version: 1.1.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:01:31.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45126", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:39:34.441217Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:39:52.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "1.1.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:22:23.465Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-45126", "datePublished": "2023-01-09T02:22:23.465Z", "dateReserved": "2022-11-24T11:48:41.242Z", "dateUpdated": "2025-04-09T13:39:52.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27131 (GCVE-0-2025-27131)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27131", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:30:43.859598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:30:51.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u0026nbsp;through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u00a0through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:58.944Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "kernel_liteos_m has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27131", "datePublished": "2025-06-08T11:46:58.944Z", "dateReserved": "2025-03-02T07:18:52.687Z", "dateUpdated": "2025-06-09T03:30:51.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-48360 (GCVE-0-2023-48360)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-17 20:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:30:34.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48360", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-02T15:15:30.638465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:29:05.789Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:11.968Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia player has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-48360", "datePublished": "2024-01-02T07:24:11.968Z", "dateReserved": "2023-11-28T02:07:56.559Z", "dateUpdated": "2025-06-17T20:29:05.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28226 (GCVE-0-2024-28226)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-12 13:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-28226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:11:55.991056Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:12:08.610Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:07.999Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Fs has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28226", "datePublished": "2024-04-02T06:23:07.999Z", "dateReserved": "2024-03-15T08:05:24.409Z", "dateUpdated": "2024-08-12T13:12:08.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-44455 (GCVE-0-2022-44455)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 13:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 Version: 3.0.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-44455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T15:27:13.698374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T15:27:27.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The appspawn and nwebspawn services within\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenHarmony-v3.1.2 and prior versions\u003c/span\u003e\n\nwere found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.\u0026nbsp;An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." } ], "value": "The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The appspawn and nwebspawn services were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-44455", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T13:54:03.395Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22837 (GCVE-0-2025-22837)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22837", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:23:10.999688Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:23:25.615Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:40.887Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22837", "datePublished": "2025-03-04T03:44:40.887Z", "dateReserved": "2025-01-20T02:01:05.647Z", "dateUpdated": "2025-03-04T14:23:25.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23234 (GCVE-0-2025-23234)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23234", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:57.350145Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:56.192Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:45.499Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23234", "datePublished": "2025-03-04T03:44:45.499Z", "dateReserved": "2025-01-20T01:59:30.188Z", "dateUpdated": "2025-03-11T16:09:56.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23240 (GCVE-0-2025-23240)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23240", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:54.142019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:50.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:46.625Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23240", "datePublished": "2025-03-04T03:44:46.625Z", "dateReserved": "2025-01-20T02:01:05.605Z", "dateUpdated": "2025-03-11T16:09:50.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-0285 (GCVE-0-2024-0285)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2025-05-07 20:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0285", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T17:44:15.598318Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-07T20:08:47.274Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:04.691Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-0285", "datePublished": "2024-02-02T06:19:04.691Z", "dateReserved": "2024-01-06T11:03:57.060Z", "dateUpdated": "2025-05-07T20:08:47.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20063 (GCVE-0-2025-20063)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:56.495009Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:33:04.168Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:20.731Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_engine has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20063", "datePublished": "2025-06-08T11:46:20.731Z", "dateReserved": "2025-03-02T07:18:04.356Z", "dateUpdated": "2025-06-09T03:33:04.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25176 (GCVE-0-2023-25176)
Vulnerability from cvelistv5
Published
2024-03-04 06:18
Modified
2024-08-02 11:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-25176", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-05T20:02:43.256719Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:18:45.255Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:18:53.563Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Pasteboard has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-25176", "datePublished": "2024-03-04T06:18:53.563Z", "dateReserved": "2023-11-28T02:39:39.375Z", "dateUpdated": "2024-08-02T11:18:35.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23808 (GCVE-0-2024-23808)
Vulnerability from cvelistv5
Published
2024-05-07 06:26
Modified
2024-08-01 23:13
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "status": "affected", "version": "4.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23808", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T17:28:30.101622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:46:13.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:26:57.552Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler ets frontend has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-23808", "datePublished": "2024-05-07T06:26:57.552Z", "dateReserved": "2024-03-15T08:05:24.430Z", "dateUpdated": "2024-08-01T23:13:08.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36423 (GCVE-0-2022-36423)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-17 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-16 - Configuration
Summary
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < Version: OpenHarmony-v1.1.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:07:33.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "OpenHarmony-v1.1.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:56", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incorrect configuration of the cJSON library lead a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-36423", "STATE": "PUBLIC", "TITLE": "Incorrect configuration of the cJSON library lead a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.0.x-LTS", "version_value": "3.0.5" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v1.1.x-LTS", "version_value": "1.1.5" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-16 Configuration" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-36423", "datePublished": "2022-09-09T14:39:56.347649Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-17T04:03:39.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20021 (GCVE-0-2025-20021)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20021", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:31:51.305940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:32:07.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:24.626Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20021", "datePublished": "2025-03-04T03:44:24.626Z", "dateReserved": "2025-01-20T01:59:30.211Z", "dateUpdated": "2025-03-04T14:32:07.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21082 (GCVE-0-2025-21082)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:36.397866Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:32:42.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:32.576Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_engine has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21082", "datePublished": "2025-06-08T11:46:32.576Z", "dateReserved": "2025-03-02T07:18:04.365Z", "dateUpdated": "2025-06-09T03:32:42.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0304 (GCVE-0-2025-0304)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:46:53.432471Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:13.883Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0304", "datePublished": "2025-02-07T09:21:13.883Z", "dateReserved": "2025-01-07T07:59:43.985Z", "dateUpdated": "2025-02-12T19:41:07.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-10074 (GCVE-0-2024-10074)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:25:34.712506Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:26:34.062Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." } ], "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:19.668Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-10074", "datePublished": "2024-12-03T12:15:19.668Z", "dateReserved": "2024-10-17T07:55:53.383Z", "dateUpdated": "2024-12-03T14:26:34.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-41802 (GCVE-0-2022-41802)
Vulnerability from cvelistv5
Published
2022-12-08 00:00
Modified
2024-08-03 12:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 Version: 3.0.0 Version: 1.1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-41802", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T13:39:57.353625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T13:40:10.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "1.1.0" } ] } ], "datePublic": "2022-12-07T07:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd" }, "references": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-41802", "datePublished": "2022-12-08T00:00:00", "dateReserved": "2022-11-24T00:00:00", "dateUpdated": "2024-08-03T12:56:38.164Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23414 (GCVE-0-2025-23414)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23414", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:48.547032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:38.750Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:48.822Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23414", "datePublished": "2025-03-04T03:44:48.822Z", "dateReserved": "2025-01-20T02:01:05.595Z", "dateUpdated": "2025-03-11T16:09:38.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47216 (GCVE-0-2023-47216)
Vulnerability from cvelistv5
Published
2024-01-02 07:23
Modified
2025-04-17 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-772 - Missing Release of Resource after Effective Lifetime
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47216", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-09T15:58:31.833787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:48:52.277Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources\n\n" } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-772", "description": "CWE-772 Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:23:02.954Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a missing release of resource vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47216", "datePublished": "2024-01-02T07:23:02.954Z", "dateReserved": "2023-11-28T02:39:39.390Z", "dateUpdated": "2025-04-17T18:48:52.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39816 (GCVE-0-2024-39816)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:52:43.847383Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:53:17.629Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:12.730Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39816", "datePublished": "2024-09-02T03:25:12.730Z", "dateReserved": "2024-07-22T03:22:00.918Z", "dateUpdated": "2024-09-03T14:53:17.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45382 (GCVE-0-2024-45382)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 13:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45382", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:07:17.095638Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T13:53:04.427Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:52.526Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-45382", "datePublished": "2024-10-08T03:03:52.526Z", "dateReserved": "2024-09-01T13:58:43.234Z", "dateUpdated": "2024-10-08T13:53:04.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43662 (GCVE-0-2022-43662)
Vulnerability from cvelistv5
Published
2023-01-09 02:23
Modified
2025-04-09 14:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1.0 < Version: 3.0.0 < Version: 1.1.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:05.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43662", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:10:41.047025Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:11:21.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "1.1.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "value": "Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:23:02.577Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-43662", "datePublished": "2023-01-09T02:23:02.577Z", "dateReserved": "2022-11-24T11:48:41.247Z", "dateUpdated": "2025-04-09T14:11:21.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45734 (GCVE-0-2023-45734)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-22 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:29:32.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45734", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T14:16:48.559826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-22T14:17:01.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:00.202Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-45734", "datePublished": "2024-02-02T06:19:00.202Z", "dateReserved": "2023-11-28T02:39:39.359Z", "dateUpdated": "2024-08-22T14:17:01.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39612 (GCVE-0-2024-39612)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:54:31.863289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:54:40.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:05.302Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Background Task Manager has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39612", "datePublished": "2024-09-02T03:25:05.302Z", "dateReserved": "2024-07-22T03:22:00.841Z", "dateUpdated": "2024-09-03T14:54:40.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21084 (GCVE-0-2025-21084)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21084", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:25:39.029590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:25:59.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:34.096Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-21084", "datePublished": "2025-03-04T03:44:34.096Z", "dateReserved": "2025-01-20T02:00:47.795Z", "dateUpdated": "2025-03-04T14:25:59.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22847 (GCVE-0-2025-22847)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22847", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:21:08.937608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:21:38.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:43.174Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22847", "datePublished": "2025-03-04T03:44:43.174Z", "dateReserved": "2025-01-20T02:00:47.838Z", "dateUpdated": "2025-03-04T14:21:38.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3758 (GCVE-0-2024-3758)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3758", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T19:28:59.679961Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T19:11:48.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:11.250Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hmdfs has a heap buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3758", "datePublished": "2024-05-07T06:27:11.250Z", "dateReserved": "2024-04-13T06:30:15.502Z", "dateUpdated": "2024-08-01T20:20:01.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47857 (GCVE-0-2023-47857)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-03 14:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:16:43.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47857", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T19:10:45.713036Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-03T14:45:56.908Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:04.740Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia camera has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47857", "datePublished": "2024-01-02T07:24:04.740Z", "dateReserved": "2023-11-28T02:07:56.545Z", "dateUpdated": "2025-06-03T14:45:56.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37185 (GCVE-0-2024-37185)
Vulnerability from cvelistv5
Published
2024-07-02 08:14
Modified
2024-08-02 03:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37185", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:43:41.744864Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T13:47:55.221Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:14:03.131Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37185", "datePublished": "2024-07-02T08:14:03.131Z", "dateReserved": "2024-06-04T12:58:28.778Z", "dateUpdated": "2024-08-02T03:50:55.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26690 (GCVE-0-2025-26690)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:37:05.724996Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:37:10.526Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:08.028Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication dsoftbus has a NULL pointer vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26690", "datePublished": "2025-08-11T02:55:08.028Z", "dateReserved": "2025-03-02T07:20:06.684Z", "dateUpdated": "2025-08-11T20:37:10.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21816 (GCVE-0-2024-21816)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21816", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-04T14:25:48.491313Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:37:33.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:14.854Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Background task manager has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21816", "datePublished": "2024-03-04T06:19:14.854Z", "dateReserved": "2024-01-06T11:01:00.571Z", "dateUpdated": "2024-08-01T22:27:36.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27217 (GCVE-0-2024-27217)
Vulnerability from cvelistv5
Published
2024-05-07 06:26
Modified
2024-08-02 00:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "status": "affected", "version": "4.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-27217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:30:00.954384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:21.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:26:51.227Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "MSDP has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-27217", "datePublished": "2024-05-07T06:26:51.227Z", "dateReserved": "2024-03-15T08:05:24.422Z", "dateUpdated": "2024-08-02T00:27:59.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24844 (GCVE-0-2025-24844)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24844", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:35:58.892620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:36:17.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:14.157Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication_dsoftbus has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24844", "datePublished": "2025-08-11T02:55:14.157Z", "dateReserved": "2025-03-02T07:20:06.700Z", "dateUpdated": "2025-08-11T20:36:17.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-42774 (GCVE-0-2023-42774)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-28 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:30:24.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T18:40:43.068592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T19:45:07.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information through incorrect default permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:35.478Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a incorrect default permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-42774", "datePublished": "2023-11-20T11:46:35.478Z", "dateReserved": "2023-11-06T02:28:36.162Z", "dateUpdated": "2024-08-28T19:45:07.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25218 (GCVE-0-2025-25218)
Vulnerability from cvelistv5
Published
2025-05-06 08:50
Modified
2025-05-06 15:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:26:33.558372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:30:17.612Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T08:50:02.099Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "third_party_mksh has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25218", "datePublished": "2025-05-06T08:50:02.099Z", "dateReserved": "2025-02-08T01:18:19.613Z", "dateUpdated": "2025-05-06T15:30:17.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-43756 (GCVE-0-2023-43756)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-02 19:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-43756", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T19:42:55.631278Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:26:03.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:38.658Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-43756", "datePublished": "2024-02-02T06:18:38.658Z", "dateReserved": "2023-11-28T02:07:56.578Z", "dateUpdated": "2024-08-02T19:52:11.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23409 (GCVE-0-2025-23409)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23409", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:51.357739Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:44.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:47.725Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23409", "datePublished": "2025-03-04T03:44:47.725Z", "dateReserved": "2025-01-20T02:00:47.859Z", "dateUpdated": "2025-03-11T16:09:44.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47402 (GCVE-0-2024-47402)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:25:58.182511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:26:16.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:29.635Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Out-of-bounds Read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47402", "datePublished": "2024-11-05T08:01:29.635Z", "dateReserved": "2024-10-07T06:18:37.598Z", "dateUpdated": "2024-11-05T14:26:16.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25278 (GCVE-0-2025-25278)
Vulnerability from cvelistv5
Published
2025-08-11 02:36
Modified
2025-08-11 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:40:04.055570Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:40:11.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:36:43.941Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25278", "datePublished": "2025-08-11T02:36:43.941Z", "dateReserved": "2025-03-02T07:20:06.732Z", "dateUpdated": "2025-08-11T20:40:11.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25217 (GCVE-0-2025-25217)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:31:47.508462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:31:54.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:49.353Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkui_ace_enginehas a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25217", "datePublished": "2025-06-08T11:46:49.353Z", "dateReserved": "2025-03-02T07:18:52.656Z", "dateUpdated": "2025-06-09T03:31:54.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3757 (GCVE-0-2024-3757)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3757", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-24T14:46:05.320746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:32:26.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:07.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3757", "datePublished": "2024-05-07T06:27:07.124Z", "dateReserved": "2024-04-13T06:30:04.973Z", "dateUpdated": "2024-08-01T20:20:01.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43696 (GCVE-0-2024-43696)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43696", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:55:24.415562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:52.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:41.262Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Memory Leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-43696", "datePublished": "2024-10-08T03:03:41.262Z", "dateReserved": "2024-09-01T13:58:43.250Z", "dateUpdated": "2024-10-08T14:02:52.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27128 (GCVE-0-2025-27128)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 13:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T13:46:43.757295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T13:48:29.345Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:20.732Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27128", "datePublished": "2025-08-11T02:55:20.732Z", "dateReserved": "2025-03-02T07:18:52.672Z", "dateUpdated": "2025-08-11T13:48:29.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21851 (GCVE-0-2024-21851)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21851", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T19:51:34.875298Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:23.471Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:09.123Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21851", "datePublished": "2024-02-02T06:19:09.123Z", "dateReserved": "2024-01-06T11:01:00.643Z", "dateUpdated": "2024-08-01T22:27:36.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23420 (GCVE-0-2025-23420)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23420", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:37.736539Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:27.184Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:51.036Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23420", "datePublished": "2025-03-04T03:44:51.036Z", "dateReserved": "2025-01-20T01:59:30.234Z", "dateUpdated": "2025-03-11T16:09:27.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27132 (GCVE-0-2025-27132)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27132", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:03:08.705171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:03:26.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:12.027Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27132", "datePublished": "2025-05-06T09:03:12.027Z", "dateReserved": "2025-03-02T07:18:04.233Z", "dateUpdated": "2025-05-06T15:03:26.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39806 (GCVE-0-2024-39806)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39806", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:56:12.460031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:03:07.248Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:27.301Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39806", "datePublished": "2024-10-08T03:03:27.301Z", "dateReserved": "2024-07-22T03:22:00.946Z", "dateUpdated": "2024-10-08T14:03:07.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28951 (GCVE-0-2024-28951)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-02 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28951", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T12:30:19.463893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-10T18:01:50.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:12.669Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28951", "datePublished": "2024-04-02T06:23:12.669Z", "dateReserved": "2024-03-15T08:05:24.413Z", "dateUpdated": "2024-08-02T01:03:51.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0035 (GCVE-0-2023-0035)
Vulnerability from cvelistv5
Published
2023-01-09 02:23
Modified
2025-04-09 14:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:08:45.617867Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:09:05.707Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\u003cbr\u003e" } ], "value": "softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:23:54.999Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "softbus_client_stub in communication subsystem has an authentication bypass vulnerability which allows an \"SA relay attack\".", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0035", "datePublished": "2023-01-09T02:23:54.999Z", "dateReserved": "2023-01-03T07:58:56.834Z", "dateUpdated": "2025-04-09T14:09:05.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6045 (GCVE-0-2023-6045)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-14 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6045", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:53:45.746657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:58:17.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:27.780Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-6045", "datePublished": "2023-11-20T11:46:27.780Z", "dateReserved": "2023-11-09T02:25:29.410Z", "dateUpdated": "2024-08-14T17:58:17.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46100 (GCVE-0-2023-46100)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-07 20:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-908 - Use of Uninitialized Resource
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:39.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T20:13:43.616571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T20:13:53.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get sensitive buffer information through use of uninitialized resource." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:40.892Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cert manager has a use of uninitialized resource vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46100", "datePublished": "2023-11-20T11:46:40.892Z", "dateReserved": "2023-11-06T02:28:36.178Z", "dateUpdated": "2024-08-07T20:13:53.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41157 (GCVE-0-2024-41157)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:51:19.191943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:52:17.647Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:17.414Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-41157", "datePublished": "2024-09-02T03:25:17.414Z", "dateReserved": "2024-07-22T03:22:00.932Z", "dateUpdated": "2024-09-03T14:52:17.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22886 (GCVE-0-2025-22886)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22886", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:02:33.939112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:02:46.649Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:16.384Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "distributeddatamgr_udmf has a memory leak vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22886", "datePublished": "2025-05-06T09:03:16.384Z", "dateReserved": "2025-03-02T07:18:04.257Z", "dateUpdated": "2025-05-06T15:02:46.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21863 (GCVE-0-2024-21863)
Vulnerability from cvelistv5
Published
2024-02-02 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21863", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T18:27:34.786673Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:25.049Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:19:13.365Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21863", "datePublished": "2024-02-02T06:19:13.365Z", "dateReserved": "2024-01-06T11:01:00.652Z", "dateUpdated": "2024-08-01T22:27:36.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22301 (GCVE-0-2023-22301)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-02-27 21:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an
arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T21:01:13.896862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T21:01:25.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions\u0026nbsp;has an \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003earbitrary memory accessing \u003c/span\u003evulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.\u003cbr\u003e" } ], "value": "The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\narbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system.\n" } ], "impacts": [ { "capecId": "CAPEC-47", "descriptions": [ { "lang": "en", "value": "CAPEC-47 Buffer Overflow via Parameter Expansion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:38.102Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The kernel subsystem hmdfs has a arbitrary memory accessing vulnerability.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-22301", "datePublished": "2023-03-10T10:44:38.102Z", "dateReserved": "2023-01-05T12:23:16.622Z", "dateUpdated": "2025-02-27T21:01:25.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47404 (GCVE-0-2024-47404)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:30:34.686696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:31:17.398Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:20.351Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has a double free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47404", "datePublished": "2024-11-05T08:01:20.351Z", "dateReserved": "2024-10-07T06:18:37.578Z", "dateUpdated": "2024-11-05T14:31:17.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0036 (GCVE-0-2023-0036)
Vulnerability from cvelistv5
Published
2023-01-09 02:24
Modified
2025-04-09 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:30:16.205831Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:32:40.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\u003cbr\u003e" } ], "value": "platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an \"SA relay attack\".Local attackers can bypass authentication and attack other SAs with high privilege.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T02:24:08.067Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "platform_callback_stub in misc subsystem has an authentication bypass vulnerability which allows an \"SA relay attack\".", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0036", "datePublished": "2023-01-09T02:24:08.067Z", "dateReserved": "2023-01-03T08:00:50.786Z", "dateUpdated": "2025-04-09T13:32:40.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27242 (GCVE-0-2025-27242)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 14:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27242", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T14:59:18.573760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T14:59:32.250Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:18.615Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ssecurity_component_manager has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27242", "datePublished": "2025-06-08T11:47:18.615Z", "dateReserved": "2025-03-02T07:18:52.705Z", "dateUpdated": "2025-06-09T14:59:32.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31071 (GCVE-0-2024-31071)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T14:24:22.843456Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T16:35:43.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:04.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:30.953Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-31071", "datePublished": "2024-07-02T08:13:30.953Z", "dateReserved": "2024-04-13T06:30:40.959Z", "dateUpdated": "2024-08-02T01:46:04.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23235 (GCVE-0-2025-23235)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:32:10.623018Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:32:19.020Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:40.229Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23235", "datePublished": "2025-06-08T11:46:40.229Z", "dateReserved": "2025-03-02T07:18:04.347Z", "dateUpdated": "2025-06-09T03:32:19.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38386 (GCVE-0-2024-38386)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:55:14.665891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:55:51.237Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:00.908Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-38386", "datePublished": "2024-09-02T03:25:00.908Z", "dateReserved": "2024-07-22T03:22:00.926Z", "dateUpdated": "2024-09-03T14:55:51.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26691 (GCVE-0-2025-26691)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26691", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:30:12.671389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:30:20.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:04.449Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "telephony_call_manager has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26691", "datePublished": "2025-06-08T11:47:04.449Z", "dateReserved": "2025-03-02T07:18:04.330Z", "dateUpdated": "2025-06-09T03:30:20.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27536 (GCVE-0-2025-27536)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27536", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:36:40.710426Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:36:45.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:12.410Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27536", "datePublished": "2025-08-11T02:55:12.410Z", "dateReserved": "2025-03-02T07:18:04.338Z", "dateUpdated": "2025-08-11T20:36:45.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22177 (GCVE-0-2024-22177)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-12 13:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22177", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:13:07.100374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:13:21.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:37.225Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Audio has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22177", "datePublished": "2024-04-02T06:22:37.225Z", "dateReserved": "2024-01-06T11:01:00.581Z", "dateUpdated": "2024-08-12T13:13:21.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22092 (GCVE-0-2024-22092)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-03T14:59:05.758033Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:42:59.478Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:58.948Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bundlemanager has an authentication bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22092", "datePublished": "2024-04-02T06:22:58.948Z", "dateReserved": "2024-03-15T08:05:24.400Z", "dateUpdated": "2024-08-01T22:35:34.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36260 (GCVE-0-2024-36260)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36260", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:47:54.804384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T13:48:04.106Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:58.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36260", "datePublished": "2024-07-02T08:13:58.124Z", "dateReserved": "2024-06-04T12:54:08.318Z", "dateUpdated": "2024-08-02T03:37:05.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47217 (GCVE-0-2023-47217)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-28 19:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T18:40:34.916023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T19:44:43.689Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:46.686Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-47217", "datePublished": "2023-11-20T11:46:46.686Z", "dateReserved": "2023-11-06T02:28:36.151Z", "dateUpdated": "2024-08-28T19:44:43.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20024 (GCVE-0-2025-20024)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:30:50.466627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:31:01.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:26.109Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20024", "datePublished": "2025-03-04T03:44:26.109Z", "dateReserved": "2025-01-20T02:00:47.846Z", "dateUpdated": "2025-03-04T14:31:01.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24301 (GCVE-0-2025-24301)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:34.711366Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:21.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:52.124Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24301", "datePublished": "2025-03-04T03:44:52.124Z", "dateReserved": "2025-01-20T02:01:05.561Z", "dateUpdated": "2025-03-11T16:09:21.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22436 (GCVE-0-2023-22436)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-03-04 21:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:17:59.256359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:18:11.431Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions\u0026nbsp;has an \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUAF\u0026nbsp;\u003c/span\u003evulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.\u003cbr\u003e" } ], "value": "The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions\u00a0has an \n\nUAF\u00a0vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.\n" } ], "impacts": [ { "capecId": "CAPEC-92", "descriptions": [ { "lang": "en", "value": "CAPEC-92 Forced Integer Overflow" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:55.029Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The kernel subsystem function check_permission_for_set_tokenid has an UAF vulnerability.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-22436", "datePublished": "2023-03-10T10:44:55.029Z", "dateReserved": "2023-01-05T12:23:16.628Z", "dateUpdated": "2025-03-04T21:18:11.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37030 (GCVE-0-2024-37030)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T13:57:09.269107Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T14:02:20.289Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:36.884Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37030", "datePublished": "2024-07-02T08:13:36.884Z", "dateReserved": "2024-06-04T12:54:08.305Z", "dateUpdated": "2024-08-02T03:43:50.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27562 (GCVE-0-2025-27562)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-12 14:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27562", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T14:24:04.031422Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T14:24:10.448Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:24.122Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "communication_dsoftbus has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27562", "datePublished": "2025-08-11T02:55:24.122Z", "dateReserved": "2025-03-02T07:20:06.694Z", "dateUpdated": "2025-08-12T14:24:10.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20626 (GCVE-0-2025-20626)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20626", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:26:54.780060Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:27:09.856Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:32.771Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20626", "datePublished": "2025-03-04T03:44:32.771Z", "dateReserved": "2025-01-20T02:01:05.678Z", "dateUpdated": "2025-03-04T14:27:09.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49118 (GCVE-0-2023-49118)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-02 21:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.4", "status": "affected", "version": "3.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-49118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-25T14:18:59.526838Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T14:21:33.656Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:45.256Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49118", "datePublished": "2024-02-02T06:18:45.256Z", "dateReserved": "2023-11-28T02:39:39.384Z", "dateUpdated": "2024-08-02T21:46:29.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22897 (GCVE-0-2025-22897)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22897", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:19:00.576693Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:10:05.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:44.313Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22897", "datePublished": "2025-03-04T03:44:44.313Z", "dateReserved": "2025-01-20T01:59:30.223Z", "dateUpdated": "2025-03-11T16:10:05.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24298 (GCVE-0-2025-24298)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:39:23.259568Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:39:28.859Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:01.139Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24298", "datePublished": "2025-08-11T02:55:01.139Z", "dateReserved": "2025-03-02T07:18:52.665Z", "dateUpdated": "2025-08-11T20:39:28.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47137 (GCVE-0-2024-47137)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:29:39.403203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:29:56.676Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:24.921Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47137", "datePublished": "2024-11-05T08:01:24.921Z", "dateReserved": "2024-10-07T06:18:37.589Z", "dateUpdated": "2024-11-05T14:29:56.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25052 (GCVE-0-2025-25052)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25052", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T14:38:12.611260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T14:48:41.647Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:38.566Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "arkcompiler_ets_runtime has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25052", "datePublished": "2025-05-06T09:03:38.566Z", "dateReserved": "2025-03-02T07:18:04.322Z", "dateUpdated": "2025-05-06T14:48:41.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29086 (GCVE-0-2024-29086)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2024-08-02 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-29086", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:13:51.026181Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:57:54.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:17.620Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has a stack overflow svulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-29086", "datePublished": "2024-04-02T06:23:17.620Z", "dateReserved": "2024-03-15T08:05:24.417Z", "dateUpdated": "2024-08-02T01:03:51.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43697 (GCVE-0-2024-43697)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43697", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:54:46.942557Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:43.222Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:46.535Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an Improper Input Validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-43697", "datePublished": "2024-10-08T03:03:46.535Z", "dateReserved": "2024-09-01T13:58:43.245Z", "dateUpdated": "2024-10-08T14:02:43.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0303 (GCVE-0-2025-0303)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0303", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:48:18.556284Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:09.442Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has a buffer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0303", "datePublished": "2025-02-07T09:21:09.442Z", "dateReserved": "2025-01-07T07:59:40.569Z", "dateUpdated": "2025-02-12T19:41:07.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0302 (GCVE-0-2025-0302)
Vulnerability from cvelistv5
Published
2025-02-07 09:21
Modified
2025-02-12 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0302", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T14:48:39.546476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:41:07.414Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow." } ], "value": "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T09:21:03.819Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an integer overflow read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0302", "datePublished": "2025-02-07T09:21:03.819Z", "dateReserved": "2025-01-07T07:59:38.265Z", "dateUpdated": "2025-02-12T19:41:07.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27241 (GCVE-0-2025-27241)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27241", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T14:51:19.025578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T14:54:50.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:33.143Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia_av_codec has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27241", "datePublished": "2025-05-06T09:03:33.143Z", "dateReserved": "2025-03-02T07:18:04.300Z", "dateUpdated": "2025-05-06T14:54:50.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31078 (GCVE-0-2024-31078)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-02 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31078", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:34:35.223133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T16:17:55.010Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:03.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:02.835Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bluetooth Service has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-31078", "datePublished": "2024-05-07T06:27:02.835Z", "dateReserved": "2024-04-13T06:30:40.953Z", "dateUpdated": "2024-08-02T01:46:03.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47797 (GCVE-0-2024-47797)
Vulnerability from cvelistv5
Published
2024-11-05 08:01
Modified
2024-11-05 14:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47797", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:31:27.650987Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:31:41.527Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:01:11.961Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds Write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-47797", "datePublished": "2024-11-05T08:01:11.961Z", "dateReserved": "2024-10-07T06:18:37.546Z", "dateUpdated": "2024-11-05T14:31:41.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22180 (GCVE-0-2024-22180)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T12:31:11.302563Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-07T15:50:30.791Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:45.558Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Camera has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22180", "datePublished": "2024-04-02T06:22:45.558Z", "dateReserved": "2024-01-06T11:01:00.647Z", "dateUpdated": "2024-08-01T22:35:34.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27577 (GCVE-0-2025-27577)
Vulnerability from cvelistv5
Published
2025-08-11 02:36
Modified
2025-08-11 20:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27577", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:40:48.401368Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:40:55.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:36:29.047Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27577", "datePublished": "2025-08-11T02:36:29.047Z", "dateReserved": "2025-03-02T07:20:06.678Z", "dateUpdated": "2025-08-11T20:40:55.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46705 (GCVE-0-2023-46705)
Vulnerability from cvelistv5
Published
2023-11-20 11:46
Modified
2024-08-07 20:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46705", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T20:31:08.869240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T20:31:18.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:46:21.070Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkruntime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46705", "datePublished": "2023-11-20T11:46:21.070Z", "dateReserved": "2023-11-06T02:28:36.166Z", "dateUpdated": "2024-08-07T20:31:18.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49142 (GCVE-0-2023-49142)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2025-06-17 20:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49142", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T20:22:50.484905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:29:06.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:22.879Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia audio has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49142", "datePublished": "2024-01-02T07:24:22.879Z", "dateReserved": "2023-11-28T02:07:56.536Z", "dateUpdated": "2025-06-17T20:29:06.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-43612 (GCVE-0-2023-43612)
Vulnerability from cvelistv5
Published
2023-11-20 11:45
Modified
2024-08-28 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:44.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.2", "status": "affected", "version": "3.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-43612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T22:52:24.707941Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T22:53:52.977Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary file read and write through improper preservation of permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:45:59.360Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hiview has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-43612", "datePublished": "2023-11-20T11:45:59.360Z", "dateReserved": "2023-11-06T02:28:36.172Z", "dateUpdated": "2024-08-28T22:53:52.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49135 (GCVE-0-2023-49135)
Vulnerability from cvelistv5
Published
2024-01-02 07:24
Modified
2024-11-14 19:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:46:29.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49135", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-16T15:43:44.377905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:23:02.826Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "value": "\nin OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-02T07:24:17.361Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "multimedia player has a UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49135", "datePublished": "2024-01-02T07:24:17.361Z", "dateReserved": "2023-11-28T02:07:56.551Z", "dateUpdated": "2024-11-14T19:23:02.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36243 (GCVE-0-2024-36243)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36243", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T14:22:24.926933Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T16:34:18.599Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:03.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds read and write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:41.186Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36243", "datePublished": "2024-07-02T08:13:41.186Z", "dateReserved": "2024-06-04T12:54:08.310Z", "dateUpdated": "2024-08-02T03:37:03.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21834 (GCVE-0-2024-21834)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21834", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:41:44.860692Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:38:06.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:31.538Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkui has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21834", "datePublished": "2024-04-02T06:22:31.538Z", "dateReserved": "2024-01-06T11:01:00.563Z", "dateUpdated": "2024-08-01T22:27:36.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-12082 (GCVE-0-2024-12082)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:24
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12082", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:24:51.471804Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:24:59.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:24.779Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ability Runtime has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-12082", "datePublished": "2024-12-03T12:15:24.779Z", "dateReserved": "2024-12-03T03:07:22.774Z", "dateUpdated": "2024-12-03T14:24:59.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-46708 (GCVE-0-2023-46708)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-02 20:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "3.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46708", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-04T14:11:50.396935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T01:35:02.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:03.484Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Wlan has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-46708", "datePublished": "2024-03-04T06:19:03.484Z", "dateReserved": "2023-11-28T02:39:39.368Z", "dateUpdated": "2024-08-02T20:53:20.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24309 (GCVE-0-2025-24309)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24309", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:31.403724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:14.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:53.216Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24309", "datePublished": "2025-03-04T03:44:53.216Z", "dateReserved": "2025-01-20T02:01:05.570Z", "dateUpdated": "2025-03-11T16:09:14.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23418 (GCVE-0-2025-23418)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-11 16:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23418", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T15:18:45.676242Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T16:09:32.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:49.916Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-23418", "datePublished": "2025-03-04T03:44:49.916Z", "dateReserved": "2025-01-20T02:00:47.842Z", "dateUpdated": "2025-03-11T16:09:32.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0083 (GCVE-0-2023-0083)
Vulnerability from cvelistv5
Published
2023-03-10 10:44
Modified
2025-02-27 21:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions,
OpenHarmony-v3.0.7 and prior versions
has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.0 < Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:42.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0083", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T21:01:59.651188Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T21:02:12.734Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.0.7", "status": "affected", "version": "3.0", "versionType": "custom" }, { "lessThanOrEqual": "3.1.5", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, \n\nOpenHarmony-v3.0.7 and prior versions\n\nhas an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.\u003cbr\u003e" } ], "value": "The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, \n\nOpenHarmony-v3.0.7 and prior versions\n\nhas an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.\n" } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:44:22.877Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The ArkUI framework subsystem doesn\u0027t check the input parameter,causing type confusion and invalid memory access.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-0083", "datePublished": "2023-03-10T10:44:22.877Z", "dateReserved": "2023-01-05T12:32:56.058Z", "dateUpdated": "2025-02-27T21:02:12.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24581 (GCVE-0-2024-24581)
Vulnerability from cvelistv5
Published
2024-04-02 06:23
Modified
2025-03-04 21:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24581", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:52:13.625448Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:53:06.014Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:19:52.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v4.0.0", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:23:03.141Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-24581", "datePublished": "2024-04-02T06:23:03.141Z", "dateReserved": "2024-03-15T08:05:24.404Z", "dateUpdated": "2025-03-04T21:53:06.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-3116 (GCVE-0-2023-3116)
Vulnerability from cvelistv5
Published
2023-11-20 11:44
Modified
2024-08-29 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:07.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:48:47.307043Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T20:48:35.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.2", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-12-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions." } ], "value": "in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-20T11:44:26.409Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has a incorrect default permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-3116", "datePublished": "2023-11-20T11:44:26.409Z", "dateReserved": "2023-06-06T06:29:14.227Z", "dateUpdated": "2024-08-29T20:48:35.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22098 (GCVE-0-2024-22098)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2024-08-01 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-17T14:37:43.746741Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T14:37:50.130Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:41.611Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "AVSession has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-22098", "datePublished": "2024-04-02T06:22:41.611Z", "dateReserved": "2024-01-06T11:01:00.591Z", "dateUpdated": "2024-08-01T22:35:34.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0587 (GCVE-0-2025-0587)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:33:24.323574Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:33:49.389Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:22.237Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-0587", "datePublished": "2025-03-04T03:44:22.237Z", "dateReserved": "2025-01-20T01:58:09.157Z", "dateUpdated": "2025-03-04T14:33:49.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3759 (GCVE-0-2024-3759)
Vulnerability from cvelistv5
Published
2024-05-07 06:27
Modified
2024-08-01 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3759", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T14:52:08.409712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:41:18.547Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.133Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T06:27:19.917Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hmdfs has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-3759", "datePublished": "2024-05-07T06:27:19.917Z", "dateReserved": "2024-04-13T06:30:21.325Z", "dateUpdated": "2024-08-01T20:20:01.133Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38701 (GCVE-0-2022-38701)
Vulnerability from cvelistv5
Published
2022-09-09 14:39
Modified
2024-09-16 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.5", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T14:39:57", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "IPC in communication subsystem has a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "scy@openharmony.io", "DATE_PUBLIC": "2022-09-06T07:44:00.000Z", "ID": "CVE-2022-38701", "STATE": "PUBLIC", "TITLE": "IPC in communication subsystem has a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenHarmony", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.1.x-Release", "version_value": "3.1.2" }, { "version_affected": "\u003c=", "version_name": "OpenHarmony-v3.0.x-LTS", "version_value": "3.0.5" } ] } } ] }, "vendor_name": "OpenHarmony" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-09.md" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-38701", "datePublished": "2022-09-09T14:39:57.040763Z", "dateReserved": "2022-09-04T00:00:00", "dateUpdated": "2024-09-16T19:10:47.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38382 (GCVE-0-2024-38382)
Vulnerability from cvelistv5
Published
2024-09-02 03:24
Modified
2024-09-03 14:56
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38382", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:56:19.059483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:56:33.327Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:24:56.930Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ability Runtime has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-38382", "datePublished": "2024-09-02T03:24:56.930Z", "dateReserved": "2024-07-22T03:22:00.852Z", "dateUpdated": "2024-09-03T14:56:33.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24493 (GCVE-0-2025-24493)
Vulnerability from cvelistv5
Published
2025-06-08 11:46
Modified
2025-06-09 03:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24493", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:31:22.237042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:31:29.376Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:46:53.804Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "kernel_liteos_a has a race condition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24493", "datePublished": "2025-06-08T11:46:53.804Z", "dateReserved": "2025-03-02T07:18:52.680Z", "dateUpdated": "2025-06-09T03:31:29.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25947 (GCVE-0-2023-25947)
Vulnerability from cvelistv5
Published
2023-03-10 10:45
Modified
2025-03-03 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:39:06.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25947", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T20:50:00.403179Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T20:50:14.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehas a null pointer reference vulnerability\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003ewhich local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.\u003cbr\u003e" } ], "value": "The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions\u00a0has a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.\n" } ], "impacts": [ { "capecId": "CAPEC-92", "descriptions": [ { "lang": "en", "value": "CAPEC-92 Forced Integer Overflow" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:45:30.665Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "The bundle management subsystem has a improper input validation when installing a HAP package.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-25947", "datePublished": "2023-03-10T10:45:30.665Z", "dateReserved": "2023-03-07T03:52:10.706Z", "dateUpdated": "2025-03-03T20:50:14.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20081 (GCVE-0-2025-20081)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:28:43.107140Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:29:00.301Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:28.501Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Dsoftbus has an UAF vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20081", "datePublished": "2025-03-04T03:44:28.501Z", "dateReserved": "2025-01-20T02:00:47.855Z", "dateUpdated": "2025-03-04T14:29:00.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26693 (GCVE-0-2025-26693)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 03:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26693", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T03:29:47.500862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T03:29:57.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:09.091Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "security_access_token has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-26693", "datePublished": "2025-06-08T11:47:09.091Z", "dateReserved": "2025-03-02T07:18:52.692Z", "dateUpdated": "2025-06-09T03:29:57.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24925 (GCVE-0-2025-24925)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-11 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24925", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T20:38:50.449379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T20:38:55.412Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:05.184Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "applications_settings has a missing release of memory vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-24925", "datePublished": "2025-08-11T02:55:05.184Z", "dateReserved": "2025-03-02T07:20:06.665Z", "dateUpdated": "2025-08-11T20:38:55.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27247 (GCVE-0-2025-27247)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 13:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27247", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T13:57:52.799480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T13:59:06.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:25.245Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Pasteboard has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27247", "datePublished": "2025-06-08T11:47:25.245Z", "dateReserved": "2025-03-02T07:18:52.710Z", "dateUpdated": "2025-06-09T13:59:06.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21845 (GCVE-0-2024-21845)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21845", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T19:49:51.432541Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:23.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:49.976Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21845", "datePublished": "2024-02-02T06:18:49.976Z", "dateReserved": "2024-01-06T11:01:00.636Z", "dateUpdated": "2024-08-01T22:27:36.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21860 (GCVE-0-2024-21860)
Vulnerability from cvelistv5
Published
2024-02-02 06:18
Modified
2024-11-08 15:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.0.0 and prior versions
allow an adjacent attacker arbitrary code execution in any apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < Version: v4.0.0 < v4.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-21860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T21:03:38.565314Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T15:38:33.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" }, { "lessThan": "v4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free." } ], "value": "\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T06:18:55.540Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-02.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Dsoftbus has a use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21860", "datePublished": "2024-02-02T06:18:55.540Z", "dateReserved": "2024-01-06T11:01:00.629Z", "dateUpdated": "2024-11-08T15:38:33.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36278 (GCVE-0-2024-36278)
Vulnerability from cvelistv5
Published
2024-07-02 08:13
Modified
2024-08-02 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThan": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:01:57.460264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T16:31:26.825Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:04.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:13:50.234Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-36278", "datePublished": "2024-07-02T08:13:50.234Z", "dateReserved": "2024-06-04T12:54:08.314Z", "dateUpdated": "2024-08-02T03:37:04.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37077 (GCVE-0-2024-37077)
Vulnerability from cvelistv5
Published
2024-07-02 08:14
Modified
2024-08-02 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37077", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T13:03:55.581949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:59:35.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.0.1", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "value": "in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through out-of-bounds write." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T08:14:14.059Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds write vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-37077", "datePublished": "2024-07-02T08:14:14.059Z", "dateReserved": "2024-06-04T12:58:28.785Z", "dateUpdated": "2024-08-02T03:43:50.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27248 (GCVE-0-2025-27248)
Vulnerability from cvelistv5
Published
2025-05-06 09:03
Modified
2025-05-06 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27248", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T15:00:57.037767Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T15:01:25.369Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-06T09:03:26.206Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "ai_neural_network_runtime has a NULL pointer dereference vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27248", "datePublished": "2025-05-06T09:03:26.206Z", "dateReserved": "2025-03-02T07:18:04.268Z", "dateUpdated": "2025-05-06T15:01:25.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49602 (GCVE-0-2023-49602)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-12 13:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:41:39.162823Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:41:57.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:09.503Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkui has a type confusion vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-49602", "datePublished": "2024-03-04T06:19:09.503Z", "dateReserved": "2023-11-28T02:07:56.574Z", "dateUpdated": "2024-08-12T13:41:57.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39775 (GCVE-0-2024-39775)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:53:52.211905Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:54:00.588Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:08.863Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Net Manager has an out-of-bounds read permission bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39775", "datePublished": "2024-09-02T03:25:08.863Z", "dateReserved": "2024-07-22T03:22:00.887Z", "dateUpdated": "2024-09-03T14:54:00.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-41686 (GCVE-0-2022-41686)
Vulnerability from cvelistv5
Published
2022-10-14 14:40
Modified
2025-05-14 15:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: OpenHarmony-v3.1.x-Release < Version: OpenHarmony-v3.0.x-LTS < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-41686", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T15:16:04.778398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T15:16:13.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.2", "status": "affected", "version": "OpenHarmony-v3.1.x-Release", "versionType": "custom" }, { "lessThanOrEqual": "3.0.6", "status": "affected", "version": "OpenHarmony-v3.0.x-LTS", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00.000Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Out-of-bound memory read and write in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The proc ...", "x_ConverterErrors": { "TITLE": { "error": "TITLE too long. Truncating in v5 record.", "message": "Truncated!" } }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2022-41686", "datePublished": "2022-10-14T14:40:04.568Z", "dateReserved": "2022-10-08T00:00:00.000Z", "dateUpdated": "2025-05-14T15:16:13.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-24465 (GCVE-0-2023-24465)
Vulnerability from cvelistv5
Published
2023-03-10 10:45
Modified
2025-03-04 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions
has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: 3.1 < Version: 3.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T21:17:00.437543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T21:17:09.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "3.1.4", "status": "affected", "version": "3.1", "versionType": "custom" }, { "lessThanOrEqual": "3.0.7", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2023-03-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehas a null pointer reference vulnerability\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003ewhich local attackers can exploit this vulnerability to cause the current application to crash.\u003cbr\u003e" } ], "value": "Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions\n\nhas a null pointer reference vulnerability\u00a0which local attackers can exploit this vulnerability to cause the current application to crash.\n" } ], "impacts": [ { "capecId": "CAPEC-6", "descriptions": [ { "lang": "en", "value": "CAPEC-6 Argument Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-10T10:45:12.940Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Wi-Fi \u00a0subsystem has a null pointer reference vulnerability when receving external data.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-24465", "datePublished": "2023-03-10T10:45:12.940Z", "dateReserved": "2023-03-07T03:52:10.691Z", "dateUpdated": "2025-03-04T21:17:09.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28044 (GCVE-0-2024-28044)
Vulnerability from cvelistv5
Published
2024-09-02 03:24
Modified
2024-09-03 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:57:16.271630Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:57:32.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:24:52.604Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an integer overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-28044", "datePublished": "2024-09-02T03:24:52.604Z", "dateReserved": "2024-07-22T03:22:00.940Z", "dateUpdated": "2024-09-03T14:57:32.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39831 (GCVE-0-2024-39831)
Vulnerability from cvelistv5
Published
2024-10-08 03:03
Modified
2024-10-08 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39831", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:55:42.635827Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:02:58.725Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." } ], "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T03:03:34.327Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "AccessTokenManager has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-39831", "datePublished": "2024-10-08T03:03:34.327Z", "dateReserved": "2024-07-22T03:22:00.866Z", "dateUpdated": "2024-10-08T14:02:58.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21826 (GCVE-0-2024-21826)
Vulnerability from cvelistv5
Published
2024-03-04 06:19
Modified
2024-08-01 22:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21826", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-07T19:52:08.070021Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:37:44.174Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker cause sensitive information leak through insecure storage." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-04T06:19:21.663Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Huks has an insecure storage of sensitive information vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-21826", "datePublished": "2024-03-04T06:19:21.663Z", "dateReserved": "2024-01-06T11:01:00.616Z", "dateUpdated": "2024-08-01T22:27:36.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27563 (GCVE-0-2025-27563)
Vulnerability from cvelistv5
Published
2025-06-08 11:47
Modified
2025-06-09 15:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.1 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27563", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-09T15:04:29.239765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-09T15:04:35.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3", "status": "affected", "version": "v5.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-08T11:47:13.415Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "security_access_token has an improper preservation of permissions vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-27563", "datePublished": "2025-06-08T11:47:13.415Z", "dateReserved": "2025-03-02T07:18:52.700Z", "dateUpdated": "2025-06-09T15:04:35.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29074 (GCVE-0-2024-29074)
Vulnerability from cvelistv5
Published
2024-04-02 06:22
Modified
2025-03-12 16:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-29074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T15:50:19.747805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T16:36:06.271Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.4", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input." } ], "value": "in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T06:22:52.042Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Telephony has an improper input validation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-29074", "datePublished": "2024-04-02T06:22:52.042Z", "dateReserved": "2024-03-15T08:05:24.395Z", "dateUpdated": "2025-03-12T16:36:06.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22841 (GCVE-0-2025-22841)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22841", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:22:27.635991Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:22:40.440Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:42.029Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arkcompiler Ets Runtime has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-22841", "datePublished": "2025-03-04T03:44:42.029Z", "dateReserved": "2025-01-20T02:01:05.715Z", "dateUpdated": "2025-03-04T14:22:40.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25212 (GCVE-0-2025-25212)
Vulnerability from cvelistv5
Published
2025-08-11 02:55
Modified
2025-08-12 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v5.0.3 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25212", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T14:28:59.360941Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T14:29:07.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.3.x", "status": "affected", "version": "v5.0.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input." } ], "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T02:55:17.285Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "pasteboard has an improper input vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-25212", "datePublished": "2025-08-11T02:55:17.285Z", "dateReserved": "2025-03-02T07:20:06.690Z", "dateUpdated": "2025-08-12T14:29:07.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20042 (GCVE-0-2025-20042)
Vulnerability from cvelistv5
Published
2025-03-04 03:44
Modified
2025-03-04 14:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T14:29:57.867914Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T14:30:17.189Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v5.0.2", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read." } ], "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T03:44:27.295Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an out of bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2025-20042", "datePublished": "2025-03-04T03:44:27.295Z", "dateReserved": "2025-01-20T01:59:30.199Z", "dateUpdated": "2025-03-04T14:30:17.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4753 (GCVE-0-2023-4753)
Vulnerability from cvelistv5
Published
2023-09-21 09:16
Modified
2024-08-02 07:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v3.2.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "v3.2.1", "status": "affected", "version": "v3.2.0", "versionType": "custom" } ] } ], "datePublic": "2023-11-05T04:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input." } ], "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T07:24:11.326Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-11.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "OpenHarmony v3.2.1 and prior version has a system call function usage error", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2023-4753", "datePublished": "2023-09-21T09:16:56.550Z", "dateReserved": "2023-09-04T07:20:46.438Z", "dateUpdated": "2024-08-02T07:37:59.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41160 (GCVE-0-2024-41160)
Vulnerability from cvelistv5
Published
2024-09-02 03:25
Modified
2024-09-03 14:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.0.0 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "openharmony", "vendor": "openharmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:49:51.381121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T14:50:58.644Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.0", "status": "affected", "version": "v4.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-02T03:25:21.861Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos-A has an use after free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-41160", "datePublished": "2024-09-02T03:25:21.861Z", "dateReserved": "2024-07-22T03:22:00.906Z", "dateUpdated": "2024-09-03T14:50:58.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9978 (GCVE-0-2024-9978)
Vulnerability from cvelistv5
Published
2024-12-03 12:15
Modified
2024-12-03 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenHarmony | OpenHarmony |
Version: v4.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T14:22:19.450312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:22:27.509Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenHarmony", "vendor": "OpenHarmony", "versions": [ { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "v4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T12:15:29.123Z", "orgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "shortName": "OpenHarmony" }, "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Liteos_a has an out-of-bounds read vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", "assignerShortName": "OpenHarmony", "cveId": "CVE-2024-9978", "datePublished": "2024-12-03T12:15:29.123Z", "dateReserved": "2024-10-15T06:17:57.851Z", "dateUpdated": "2024-12-03T14:22:27.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }