Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58292: CWE-27 Path Traversal: 'dir/../../filename' in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-58292cvecve-2025-58292cwe-27
Published: Sat Oct 11 2025 (10/11/2025, 08:52:23 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58292 is a low-severity path traversal vulnerability in Huawei HarmonyOS versions 5. 0. 1 and 5. 1. 0 affecting the office service. The flaw allows an attacker with local access and user interaction to craft directory traversal sequences ('dir/.. /.. /filename') that can cause a denial of service (DoS) by impacting system availability. No confidentiality or integrity impact is reported, and no known exploits are currently observed in the wild. The vulnerability requires local access and user interaction, limiting its ease of exploitation and scope.

AI-Powered Analysis

AILast updated: 10/11/2025, 09:11:53 UTC

Technical Analysis

CVE-2025-58292 is a path traversal vulnerability classified under CWE-27 found in Huawei's HarmonyOS, specifically affecting the office service component in versions 5.0.1 and 5.1.0. The vulnerability arises from improper sanitization of file path inputs, allowing an attacker to use directory traversal sequences like 'dir/../../filename' to access unintended file system locations. While this does not lead to unauthorized data access or modification, it can cause a denial of service (DoS) by disrupting the availability of the office service, potentially crashing the service or causing it to malfunction. The CVSS 3.1 score is 3.3 (low), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) is necessary. The scope remains unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity impact. No patches have been published yet, and no known exploits are reported in the wild. The vulnerability's exploitation vector suggests that an attacker must have local access to the device and trick a user into interacting with a malicious file path input, limiting the attack surface primarily to insiders or users with physical or remote local access. This vulnerability highlights the importance of input validation and secure file handling in embedded operating systems like HarmonyOS.

Potential Impact

For European organizations, the primary impact of CVE-2025-58292 is a potential denial of service affecting the availability of the office service on HarmonyOS devices. This could disrupt productivity and business operations relying on Huawei's HarmonyOS ecosystem, especially in environments where these devices are integrated into office workflows. Although the impact on confidentiality and integrity is null, service unavailability can lead to operational delays and increased support costs. The requirement for local access and user interaction reduces the risk of widespread remote exploitation, but insider threats or compromised local accounts could leverage this vulnerability. Organizations using Huawei HarmonyOS devices in critical roles should be aware of potential service interruptions and plan for incident response accordingly. The lack of known exploits in the wild currently limits immediate risk, but proactive mitigation is advised to prevent future exploitation.

Mitigation Recommendations

1. Restrict local user permissions on HarmonyOS devices to minimize the risk of unauthorized local access. 2. Educate users to avoid interacting with suspicious file paths or untrusted input that could trigger the vulnerability. 3. Implement monitoring and logging for unusual file path access patterns within the office service to detect potential exploitation attempts. 4. Once Huawei releases patches or updates addressing CVE-2025-58292, apply them promptly to affected devices. 5. Employ application whitelisting or sandboxing techniques to limit the office service's ability to access arbitrary file system locations. 6. Conduct regular security audits and vulnerability assessments on HarmonyOS deployments to identify and remediate similar issues. 7. For organizations with critical operations, consider network segmentation to isolate HarmonyOS devices and reduce the impact of potential DoS conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea1bb15baaa01f1c9d1d44

Added to database: 10/11/2025, 8:56:17 AM

Last enriched: 10/11/2025, 9:11:53 AM

Last updated: 10/11/2025, 3:41:16 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats