Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57838: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor MagicOS

0
Medium
VulnerabilityCVE-2025-57838cvecve-2025-57838cwe-200
Published: Mon Oct 20 2025 (10/20/2025, 07:58:07 UTC)
Source: CVE Database V5
Vendor/Project: Honor
Product: MagicOS

Description

CVE-2025-57838 is an information disclosure vulnerability in Honor's MagicOS that allows unauthorized local attackers to access sensitive information without authentication or user interaction. The vulnerability has a medium severity with a CVSS score of 4. 0, indicating limited confidentiality impact and no effect on integrity or availability. Exploitation requires local access but no privileges or user interaction, making it a concern primarily for devices physically or logically accessible to attackers. There are no known exploits in the wild, and no patches have been released yet. European organizations using Honor devices with MagicOS could face confidentiality risks if attackers gain local access. Mitigation should focus on restricting local access, monitoring device usage, and applying vendor updates once available. Countries with higher Honor device market penetration and strategic interest in mobile security, such as Germany, France, Spain, and the UK, are more likely to be affected. Overall, the threat is medium severity due to limited impact scope and exploitation complexity.

AI-Powered Analysis

AILast updated: 10/27/2025, 12:58:56 UTC

Technical Analysis

CVE-2025-57838 is a vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors within Honor's MagicOS operating system. MagicOS is the proprietary OS used on Honor smartphones and related devices. This vulnerability allows an attacker with local access to the device to obtain sensitive information without requiring any privileges or user interaction. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) reflects that the attack vector is local, with low attack complexity, no privileges required, and no user interaction needed. The scope remains unchanged, and the impact is limited to confidentiality, with no impact on integrity or availability. The vulnerability was reserved in August 2025 and published in October 2025, with no known exploits in the wild or patches currently available. The lack of required privileges or user interaction means that any unauthorized local user or malware with local execution capabilities could potentially extract sensitive data from the device, which could include personal information, credentials, or other confidential data stored or processed by MagicOS. This vulnerability poses a risk especially in scenarios where devices might be lost, stolen, or accessed by malicious insiders or malware with local execution capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2025-57838 lies in the potential exposure of sensitive information stored on or processed by Honor devices running MagicOS. This could lead to confidentiality breaches affecting personal data, corporate credentials, or proprietary information. Although the vulnerability does not affect integrity or availability, the leakage of sensitive data could facilitate further attacks such as identity theft, corporate espionage, or targeted phishing campaigns. The requirement for local access limits the attack surface, but in environments where devices are shared, lost, or physically accessible to unauthorized personnel, the risk increases. Organizations relying on Honor devices for communication or data storage should be aware of this risk, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. The absence of known exploits reduces immediate risk but does not eliminate the threat, particularly as attackers may develop exploits once the vulnerability becomes public knowledge.

Mitigation Recommendations

1. Restrict physical and logical local access to Honor devices running MagicOS by enforcing strict device usage policies and access controls. 2. Employ full-disk encryption and strong device authentication mechanisms to reduce the risk of unauthorized local data access. 3. Monitor devices for signs of unauthorized access or malware that could exploit local vulnerabilities. 4. Educate users on the importance of safeguarding their devices from loss or theft. 5. Maintain an inventory of all Honor devices in use and track their security status. 6. Apply security updates and patches from Honor promptly once they become available to address this vulnerability. 7. Consider deploying mobile device management (MDM) solutions that can enforce security policies and remotely wipe compromised devices. 8. Limit the installation of untrusted applications that could gain local execution capabilities and exploit the vulnerability. 9. Conduct regular security assessments and penetration tests focusing on mobile device security within the organization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Honor
Date Reserved
2025-08-21T03:17:26.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f5ee79ee3f99bfc7e1bfb4

Added to database: 10/20/2025, 8:10:33 AM

Last enriched: 10/27/2025, 12:58:56 PM

Last updated: 12/4/2025, 10:46:01 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats