Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58288: CWE-275 Permission Issues in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-58288cvecve-2025-58288cwe-275
Published: Sat Oct 11 2025 (10/11/2025, 08:48:53 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 10/11/2025, 09:12:39 UTC

Technical Analysis

CVE-2025-58288 is a denial of service vulnerability identified in Huawei's HarmonyOS, specifically affecting versions 5.0.1 and 5.1.0. The root cause is a permission issue classified under CWE-275, which relates to improper privilege management that allows unauthorized or insufficiently authorized users to trigger a denial of service condition. The vulnerability resides in the office service component of HarmonyOS, which is likely a core application or service used for productivity tasks. Exploitation requires local access with low privileges (AV:L - Attack Vector: Local) and no privileges (PR:N - Privileges Required: None), but user interaction is necessary (UI:R). The attacker can cause a denial of service, impacting the availability of the office service, but there is no confidentiality or integrity impact. The CVSS 3.1 base score is 5.5, indicating a medium severity level. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability was reserved on August 28, 2025, and published on October 11, 2025. Given the nature of the vulnerability, it could be leveraged by malicious insiders or malware with local access to disrupt business operations by rendering office services unusable.

Potential Impact

For European organizations, the primary impact of CVE-2025-58288 is operational disruption due to denial of service on Huawei HarmonyOS office services. This can affect productivity, especially in environments where HarmonyOS devices are integrated into daily workflows or critical office applications. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can lead to downtime, delayed business processes, and potential financial losses. Sectors such as government, telecommunications, and enterprises with Huawei device deployments may experience increased risk. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk from insider threats or compromised endpoints. The lack of patches increases exposure until mitigations or updates are available.

Mitigation Recommendations

1. Restrict physical and local access to devices running affected HarmonyOS versions to trusted personnel only. 2. Implement strict user access controls and monitor for unusual local user activity that could indicate exploitation attempts. 3. Educate users about the risks of interacting with untrusted applications or links that might trigger the vulnerability. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous behaviors related to office service crashes or denials. 5. Maintain an inventory of all HarmonyOS devices and prioritize patch management once Huawei releases updates addressing this vulnerability. 6. Consider network segmentation to isolate critical systems using HarmonyOS devices to limit potential lateral movement. 7. Engage with Huawei support channels for early access to patches or workarounds. 8. Prepare incident response plans specifically for denial of service scenarios affecting office productivity services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d3b

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/11/2025, 9:12:39 AM

Last updated: 10/16/2025, 8:25:50 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats