Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58291: CWE-29 Path Traversal: '\..\filename' in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-58291cvecve-2025-58291cwe-29
Published: Sat Oct 11 2025 (10/11/2025, 08:51:04 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 10/19/2025, 01:06:16 UTC

Technical Analysis

CVE-2025-58291 is a path traversal vulnerability classified under CWE-29, affecting Huawei HarmonyOS versions 5.0.1 and 5.1.0, specifically within the office service component. The vulnerability allows an attacker to use path traversal sequences like '\..\filename' to manipulate file paths improperly. This can lead to denial of service (DoS) conditions by causing the office service to malfunction or crash, thereby affecting system availability. The CVSS 3.1 base score is 3.3, reflecting low severity due to the requirement for local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), and only availability is impacted (A:L), with no confidentiality or integrity loss. No known exploits are currently reported in the wild, and no patches have been released yet. The vulnerability's root cause is insufficient validation or sanitization of file path inputs, enabling traversal sequences to disrupt normal file handling. This vulnerability primarily threatens the availability of the office service on affected HarmonyOS devices, potentially causing service interruptions or crashes when exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-58291 is the potential denial of service on Huawei HarmonyOS devices running the affected versions. This could disrupt business operations relying on the office service, particularly in environments where HarmonyOS devices are integrated into workflows or critical communication. Although the vulnerability does not compromise data confidentiality or integrity, availability interruptions can lead to productivity losses and operational delays. Organizations with Huawei device deployments in sectors such as telecommunications, manufacturing, or government may face increased risk. The low severity and requirement for local access and user interaction limit the attack surface, but insider threats or compromised endpoints could exploit this vulnerability. The absence of known exploits reduces immediate risk, but the lack of patches necessitates proactive mitigation to avoid potential exploitation as threat actors develop attack methods.

Mitigation Recommendations

1. Restrict local access to HarmonyOS devices, ensuring only trusted users can interact with the office service. 2. Implement strict endpoint security controls to prevent unauthorized local access or execution of malicious inputs. 3. Monitor logs and file system activity for unusual path traversal patterns, especially sequences containing '\..\' or similar traversal indicators. 4. Educate users about the risks of interacting with untrusted files or inputs that could trigger the vulnerability. 5. Coordinate with Huawei for timely patch deployment once available; maintain close vendor communication for updates. 6. Employ application whitelisting or sandboxing for the office service to limit the impact of potential exploitation. 7. Conduct regular vulnerability assessments on HarmonyOS devices to detect and remediate potential exploitation attempts. 8. Consider network segmentation to isolate critical HarmonyOS devices from broader enterprise networks to contain potential DoS impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d41

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/19/2025, 1:06:16 AM

Last updated: 12/2/2025, 5:44:54 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats