Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58286: CWE-25 Path Traversal: '/../filedir' in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-58286cvecve-2025-58286cwe-25
Published: Sat Oct 11 2025 (10/11/2025, 08:43:00 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 10/19/2025, 01:05:22 UTC

Technical Analysis

CVE-2025-58286 is a path traversal vulnerability classified under CWE-25 found in the office service component of Huawei's HarmonyOS versions 5.0.1 and 5.1.0. This vulnerability allows an attacker to manipulate file paths by injecting '/../filedir' sequences, enabling traversal outside the intended directory boundaries. The primary impact is a denial of service (DoS), as successful exploitation can disrupt the availability of the office service. The CVSS 3.1 score is 3.3, indicating low severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:L) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability arises from insufficient validation of file path inputs, allowing directory traversal sequences to be processed improperly. This can cause the service to malfunction or crash, leading to denial of service conditions. Given the nature of the vulnerability, exploitation requires an attacker to have local access and induce a user action, limiting remote exploitation potential. The lack of patches necessitates vigilance and interim protective measures until official fixes are available.

Potential Impact

For European organizations, the primary impact of CVE-2025-58286 is the potential disruption of availability in systems running Huawei HarmonyOS office services. This could affect business continuity, especially in environments relying on HarmonyOS devices for office productivity or critical workflows. While confidentiality and integrity are not compromised, denial of service conditions can lead to operational delays and reduced productivity. Organizations with Huawei device deployments in sectors such as telecommunications, government, or enterprises using HarmonyOS may face increased risk. The requirement for local access and user interaction reduces the likelihood of widespread exploitation but does not eliminate insider threat or targeted attack scenarios. In critical infrastructure or sensitive environments, even low-severity availability disruptions can have cascading effects. Therefore, European entities should assess their exposure based on device usage and implement controls to minimize local exploitation opportunities.

Mitigation Recommendations

1. Restrict local access to HarmonyOS devices, ensuring only trusted users can interact with the office service. 2. Implement strict user privilege management to minimize unnecessary access rights, reducing the risk of unauthorized local exploitation. 3. Monitor logs and system behavior for unusual file path access patterns or repeated failures in the office service that may indicate exploitation attempts. 4. Educate users about the risks of interacting with untrusted content or applications that might trigger the vulnerability. 5. Apply network segmentation to isolate HarmonyOS devices from critical infrastructure to limit impact in case of a DoS event. 6. Stay updated with Huawei security advisories and apply patches promptly once available. 7. Consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous file system activities related to path traversal attempts. 8. Conduct regular security audits and vulnerability assessments on HarmonyOS deployments to identify and remediate potential exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.967Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d4a

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/19/2025, 1:05:22 AM

Last updated: 12/4/2025, 4:00:10 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats