Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58291: CWE-29 Path Traversal: '\..\filename' in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-58291cvecve-2025-58291cwe-29
Published: Sat Oct 11 2025 (10/11/2025, 08:51:04 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58291 is a low-severity denial of service (DoS) vulnerability in Huawei HarmonyOS versions 5. 0. 1 and 5. 1. 0 affecting the office service. It stems from a path traversal issue (CWE-29) where specially crafted input using '\.. \filename' can disrupt normal operations, leading to availability impact. Exploitation requires local access and user interaction but no privileges. The vulnerability does not affect confidentiality or integrity and has no known exploits in the wild. European organizations using Huawei devices running these HarmonyOS versions could experience service disruptions if targeted.

AI-Powered Analysis

AILast updated: 10/11/2025, 09:12:06 UTC

Technical Analysis

CVE-2025-58291 is a path traversal vulnerability classified under CWE-29 found in the office service component of Huawei's HarmonyOS versions 5.0.1 and 5.1.0. The vulnerability allows an attacker to use specially crafted input containing path traversal sequences such as '\..\filename' to manipulate file paths processed by the office service. This manipulation can cause the service to behave unexpectedly, resulting in a denial of service (DoS) condition that affects system availability. The vulnerability does not compromise confidentiality or integrity, as it does not allow unauthorized data access or modification. Exploitation requires local access to the device and user interaction, with no privileges needed, which limits the attack surface. The CVSS 3.1 base score is 3.3, reflecting low severity primarily due to the limited impact and the need for user interaction. There are no known public exploits or patches currently available. The vulnerability was reserved on August 28, 2025, and published on October 11, 2025. The absence of patch links suggests that Huawei may still be developing or distributing fixes. The root cause is improper validation or sanitization of file path inputs in the office service, allowing traversal sequences to disrupt normal file handling. This can lead to service crashes or unavailability, impacting user productivity and system reliability.

Potential Impact

For European organizations, the primary impact of CVE-2025-58291 is on availability, potentially causing denial of service conditions in Huawei devices running affected HarmonyOS versions. This could disrupt office-related services, affecting business continuity and productivity, especially in environments relying on Huawei hardware or software ecosystems. Although the vulnerability does not expose sensitive data or allow unauthorized modifications, service outages can still have operational and reputational consequences. The requirement for local access and user interaction reduces the risk of widespread remote exploitation but does not eliminate insider threats or scenarios where attackers gain physical or remote user-level access. Organizations in sectors with high reliance on Huawei technology, such as telecommunications, manufacturing, or government agencies, may face increased risk. Additionally, the lack of available patches at the time of disclosure means organizations must rely on interim mitigations to reduce exposure. Overall, the impact is contained but non-negligible for affected environments.

Mitigation Recommendations

1. Monitor Huawei's official security advisories and promptly apply patches or updates once they become available to address CVE-2025-58291. 2. Restrict local access to devices running HarmonyOS, especially those with the affected office service, to trusted users only. 3. Implement strict user interaction policies and educate users about the risks of interacting with untrusted files or inputs that could trigger the vulnerability. 4. Employ application whitelisting and endpoint protection solutions to detect and prevent exploitation attempts involving path traversal payloads. 5. Conduct regular audits of device configurations and logs to identify unusual crashes or service disruptions indicative of exploitation attempts. 6. Where feasible, isolate critical Huawei devices from less trusted network segments to limit attack vectors requiring local access. 7. Collaborate with Huawei support channels to obtain early access to patches or workarounds. 8. Consider alternative software or hardware solutions if the risk profile is unacceptable and patching is delayed. These steps go beyond generic advice by focusing on access control, user behavior, and proactive monitoring tailored to the specific vulnerability characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d41

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/11/2025, 9:12:06 AM

Last updated: 10/11/2025, 3:41:17 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats