Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57839: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor MagicOS

0
Medium
VulnerabilityCVE-2025-57839cvecve-2025-57839cwe-200
Published: Mon Oct 20 2025 (10/20/2025, 08:04:00 UTC)
Source: CVE Database V5
Vendor/Project: Honor
Product: MagicOS

Description

Photo module is affected by information leak vulnerability, successful exploitation of this vulnerability may affect service confidentiality.

AI-Powered Analysis

AILast updated: 10/20/2025, 08:12:28 UTC

Technical Analysis

CVE-2025-57839 is a medium severity vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Photo module of Honor's MagicOS. The flaw allows an attacker with local access to the device to leak sensitive information from the Photo module without requiring any privileges or user interaction. The vulnerability impacts confidentiality only, with no effect on integrity or availability. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) indicates that the attack vector is local, attack complexity is low, no privileges or user interaction are required, and the scope remains unchanged. This means an attacker must have physical or local access to the device to exploit the vulnerability, but the exploitation process is straightforward. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability could allow unauthorized disclosure of sensitive photos or metadata stored or processed by the Photo module, potentially leading to privacy violations or data leakage. The lack of authentication or user interaction requirements increases the risk if devices are lost, stolen, or accessed by malicious insiders. However, the local access requirement limits remote exploitation scenarios.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive images or related metadata stored on devices running Honor MagicOS. This could lead to privacy breaches, exposure of confidential corporate or personal information, and reputational damage. Organizations relying on Honor mobile devices for business communications or data storage may face increased risk if devices are lost, stolen, or accessed by unauthorized personnel. The vulnerability does not affect device integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could have compliance implications under GDPR, especially if personal data is exposed. The local access requirement reduces the risk of remote attacks but does not eliminate insider threats or risks from physical device compromise. Organizations with mobile device management (MDM) solutions and strong endpoint security controls may mitigate some risks, but awareness and prompt patching remain critical.

Mitigation Recommendations

1. Limit physical and local access to devices running Honor MagicOS, especially those used in sensitive environments. 2. Implement strong device access controls such as biometric authentication, PINs, or passwords to reduce unauthorized local access. 3. Employ mobile device management (MDM) solutions to monitor device status, enforce security policies, and remotely wipe lost or stolen devices. 4. Educate users about the risks of leaving devices unattended or lending them to untrusted individuals. 5. Regularly check for and apply vendor security updates or patches as soon as they become available to remediate the vulnerability. 6. Restrict installation of untrusted applications that could exploit local vulnerabilities. 7. Monitor for unusual access patterns or data exfiltration attempts from mobile devices. 8. Consider encrypting sensitive photos and data stored on devices to reduce the impact of unauthorized access. 9. Coordinate with Honor support channels to obtain timely information about patches or workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Honor
Date Reserved
2025-08-21T03:17:26.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f5ee79ee3f99bfc7e1bfb7

Added to database: 10/20/2025, 8:10:33 AM

Last enriched: 10/20/2025, 8:12:28 AM

Last updated: 10/20/2025, 2:25:33 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats