Skip to main content

CVE-2025-21082: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in OpenHarmony OpenHarmony

Low
VulnerabilityCVE-2025-21082cvecve-2025-21082cwe-843
Published: Sun Jun 08 2025 (06/08/2025, 11:46:32 UTC)
Source: CVE Database V5
Vendor/Project: OpenHarmony
Product: OpenHarmony

Description

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:39:53 UTC

Technical Analysis

CVE-2025-21082 is a vulnerability identified in OpenHarmony version 5.0.3 and earlier, specifically affecting version 5.0.1. The issue is classified as CWE-843, which corresponds to 'Access of Resource Using Incompatible Type,' commonly known as a type confusion vulnerability. This flaw allows a local attacker to cause application crashes by exploiting the improper handling of data types within the OpenHarmony operating system. Type confusion vulnerabilities occur when a program accesses a resource using a type that is incompatible with the actual type of the resource, potentially leading to undefined behavior such as memory corruption or crashes. In this case, the vulnerability does not appear to allow for privilege escalation, data leakage, or code execution, but it does impact application availability by causing crashes. The CVSS v3.1 base score is 3.3, indicating a low severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) shows that the attack requires local access with low privileges, no user interaction, and results only in availability impact without affecting confidentiality or integrity. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability is limited to local attackers, meaning remote exploitation is not feasible, and the scope is unchanged, affecting only the vulnerable application instance.

Potential Impact

For European organizations, the impact of CVE-2025-21082 is relatively limited due to its low severity and local attack vector. The primary consequence is potential denial of service at the application level, where affected apps may crash unexpectedly. This could disrupt user experience or critical local services running on OpenHarmony devices. Since OpenHarmony is an open-source operating system designed for IoT and smart devices, organizations utilizing such devices in operational technology (OT), smart building management, or consumer electronics could experience intermittent service interruptions. However, the lack of confidentiality or integrity impact reduces the risk of data breaches or system compromise. The requirement for local access and low privileges means that attackers must already have some presence on the device, limiting the threat to insider threats or attackers who have gained physical or local network access. European organizations deploying OpenHarmony-based devices in sensitive environments should be aware of potential stability issues but are unlikely to face severe security breaches from this vulnerability alone.

Mitigation Recommendations

To mitigate CVE-2025-21082 effectively, European organizations should: 1) Monitor for updates from the OpenHarmony project and apply patches promptly once released, as no patch links are currently available. 2) Restrict local access to devices running OpenHarmony by enforcing strict physical security controls and network segmentation to minimize the risk of local attackers. 3) Implement application whitelisting and integrity monitoring on OpenHarmony devices to detect abnormal application crashes or suspicious behavior indicative of exploitation attempts. 4) Conduct regular audits of user privileges on devices to ensure that only trusted users have local access, reducing the attack surface. 5) For critical deployments, consider deploying additional monitoring tools that can detect and alert on application crashes or unusual system behavior to enable rapid response. 6) Engage with device vendors to confirm the use of OpenHarmony versions and coordinate vulnerability management efforts. These steps go beyond generic advice by focusing on access control, monitoring, and vendor coordination specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OpenHarmony
Date Reserved
2025-03-02T07:18:04.365Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68458da771f4d251b55103aa

Added to database: 6/8/2025, 1:18:31 PM

Last enriched: 7/9/2025, 12:39:53 AM

Last updated: 8/13/2025, 1:03:42 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats