Skip to main content

CVE-2025-25052: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in OpenHarmony OpenHarmony

Low
VulnerabilityCVE-2025-25052cvecve-2025-25052cwe-120
Published: Tue May 06 2025 (05/06/2025, 09:03:38 UTC)
Source: CVE
Vendor/Project: OpenHarmony
Product: OpenHarmony

Description

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:40:22 UTC

Technical Analysis

CVE-2025-25052 is a buffer overflow vulnerability classified under CWE-120, identified in OpenHarmony versions 5.0.3 and prior, including version 4.1.0. The vulnerability arises due to improper handling of buffer sizes during copy operations, where the input size is not adequately checked before copying data into a buffer. This classic buffer overflow flaw can be exploited by a local attacker to cause a denial of service (DoS) condition by crashing or destabilizing the affected system. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), meaning it is relatively straightforward to exploit once local access is obtained. The CVSS v3.1 base score is 3.3, indicating a low severity primarily due to the limited impact scope—no confidentiality or integrity impact, only availability is affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant in environments where OpenHarmony is deployed, especially in embedded or IoT devices running this operating system, as a local attacker could disrupt device availability by triggering the buffer overflow. Given the local attack vector, remote exploitation is not feasible without prior access, limiting the threat surface but still posing risks in multi-user or physically accessible environments.

Potential Impact

For European organizations, the impact of CVE-2025-25052 depends largely on the deployment scale of OpenHarmony-based devices within their infrastructure. OpenHarmony is an open-source operating system primarily targeting IoT and embedded systems, which are increasingly used in industrial control systems, smart city infrastructure, and consumer electronics. A successful exploitation could lead to denial of service on critical devices, potentially disrupting operations or services relying on these devices. While the vulnerability does not compromise data confidentiality or integrity, availability disruptions in critical IoT deployments—such as smart meters, building automation, or industrial sensors—could have cascading effects on operational continuity and safety. European organizations in sectors like manufacturing, utilities, and smart infrastructure should be particularly aware of this threat. However, the requirement for local access and low severity score suggest that the risk is moderate and more relevant in scenarios where attackers have physical or local network access to devices running vulnerable OpenHarmony versions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory all devices running OpenHarmony, especially versions 5.0.3 and earlier, including version 4.1.0. 2) Apply vendor-provided patches or updates as soon as they become available; if no official patch exists yet, monitor OpenHarmony security advisories closely. 3) Restrict local access to devices running OpenHarmony by enforcing strict physical security controls and network segmentation to limit attacker proximity. 4) Implement host-based intrusion detection or anomaly detection systems to monitor for unusual crashes or service disruptions indicative of exploitation attempts. 5) Employ application whitelisting and privilege restrictions to minimize the ability of low-privileged users to execute potentially harmful operations. 6) For critical IoT deployments, consider deploying redundant systems or failover mechanisms to maintain availability in case of device failure. 7) Educate operational technology (OT) and IT teams about this vulnerability to ensure rapid response and incident handling if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OpenHarmony
Date Reserved
2025-03-02T07:18:04.322Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda68f

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:40:22 PM

Last updated: 8/6/2025, 1:57:21 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats