Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44561: Permission verification vulnerability in Huawei HarmonyOS

0
High
VulnerabilityCVE-2022-44561cvecve-2022-44561
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Huawei
Product: HarmonyOS

Description

The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:28:28 UTC

Technical Analysis

CVE-2022-44561 is a high-severity permission verification vulnerability identified in Huawei's HarmonyOS version 2.0, specifically affecting the preset launcher module. The vulnerability arises due to improper permission checks (classified under CWE-276: Incorrect Default Permissions) that allow unauthorized applications to add arbitrary widgets and shortcuts to the user interface without any user interaction or authentication. This means that a malicious app, without requiring any privileges or user consent, can manipulate the launcher by injecting widgets or shortcuts, potentially misleading users, facilitating phishing attacks, or enabling further malicious activities such as launching unauthorized actions or escalating privileges indirectly. The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high impact primarily on integrity, with no impact on confidentiality or availability. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely if a malicious app is installed. Although no known exploits are reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the potential for persistent unauthorized UI modifications that could be leveraged in broader attack chains. No official patches or mitigation links have been published yet, increasing the urgency for affected users and organizations to monitor for updates and apply security best practices.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modifications of user interfaces on devices running HarmonyOS 2.0, potentially undermining user trust and device integrity. The ability to add arbitrary widgets or shortcuts without user consent can be exploited to conduct social engineering attacks, such as phishing or credential harvesting, by presenting deceptive UI elements that appear legitimate. This could compromise sensitive corporate data if users are tricked into entering credentials or executing malicious actions. Additionally, compromised devices could serve as footholds for further lateral movement or espionage, especially in sectors where Huawei devices are prevalent. Although the vulnerability does not directly impact confidentiality or availability, the integrity compromise can have cascading effects on organizational security posture. Given the increasing adoption of HarmonyOS in consumer and some enterprise environments in Europe, especially in countries with significant Huawei market presence, this vulnerability poses a tangible risk to device security and user safety.

Mitigation Recommendations

1. Immediate mitigation involves restricting the installation of untrusted or unknown applications on HarmonyOS devices, especially those sourced outside official app stores. 2. Organizations should enforce mobile device management (MDM) policies that limit app permissions and monitor for unauthorized UI changes. 3. Users and administrators should regularly check for official security updates from Huawei and apply patches as soon as they become available. 4. Employ application whitelisting to prevent installation of potentially malicious apps that could exploit this vulnerability. 5. Educate users about the risks of interacting with unexpected widgets or shortcuts and encourage reporting of suspicious UI behavior. 6. Network-level controls can be implemented to restrict app communications that might facilitate exploitation. 7. For critical environments, consider isolating or limiting the use of HarmonyOS devices until patches are released. 8. Monitor device logs and behavior for anomalies indicative of unauthorized widget or shortcut additions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2022-11-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbece56

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:28:28 AM

Last updated: 2/7/2026, 12:27:04 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats