Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58292: CWE-27 Path Traversal: 'dir/../../filename' in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-58292cvecve-2025-58292cwe-27
Published: Sat Oct 11 2025 (10/11/2025, 08:52:23 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 10/19/2025, 01:06:29 UTC

Technical Analysis

CVE-2025-58292 is a path traversal vulnerability classified under CWE-27, discovered in Huawei's HarmonyOS versions 5.0.1 and 5.1.0, specifically within the office service component. The vulnerability arises when the system improperly sanitizes file path inputs, allowing an attacker to use directory traversal sequences like 'dir/../../filename' to access unintended file system locations. This can lead to a denial of service (DoS) condition by causing the office service to malfunction or crash, thereby affecting system availability. The vulnerability requires local access (attack vector: local) and user interaction, meaning an attacker must have some level of access to the device and trick a user into performing an action. The CVSS v3.1 base score is 3.3, indicating low severity, with no impact on confidentiality or integrity, only availability. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since August 2025. The limited attack surface and requirement for user interaction reduce the likelihood of widespread exploitation, but the potential for service disruption remains a concern, especially in environments relying heavily on HarmonyOS office services.

Potential Impact

For European organizations, the primary impact of CVE-2025-58292 is the potential denial of service affecting availability of office services on HarmonyOS devices. This could disrupt productivity and business operations, particularly in sectors where Huawei devices are integrated into daily workflows, such as telecommunications, manufacturing, and government agencies. Although the vulnerability does not compromise data confidentiality or integrity, service interruptions could lead to operational delays and increased support costs. The requirement for local access and user interaction limits remote exploitation risks, but insider threats or social engineering attacks could still trigger the vulnerability. Organizations with large deployments of Huawei HarmonyOS devices may face increased risk of service degradation or outages if the vulnerability is exploited. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

1. Monitor Huawei’s official security advisories and apply patches promptly once they are released to address CVE-2025-58292. 2. Restrict local user permissions on HarmonyOS devices to minimize the risk of unauthorized local access. 3. Implement strict access controls and user training to reduce the likelihood of successful social engineering or user interaction required for exploitation. 4. Employ application whitelisting and endpoint protection solutions that can detect anomalous file access patterns indicative of path traversal attempts. 5. Regularly audit and monitor logs for unusual file system activity related to the office service. 6. Segment networks to isolate critical systems running HarmonyOS to contain potential disruptions. 7. Consider deploying device usage policies limiting installation or execution of untrusted applications that could trigger the vulnerability. 8. Engage in proactive incident response planning to quickly address any service disruptions caused by exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d44

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/19/2025, 1:06:29 AM

Last updated: 12/2/2025, 12:43:18 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats