Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58304: CWE-199 Information Management Errors in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-58304cvecve-2025-58304cwe-199
Published: Fri Nov 28 2025 (11/28/2025, 02:58:34 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58304 is a medium severity permission control vulnerability in the file management module of Huawei's HarmonyOS versions 5. 0. 1, 5. 1. 0, and 6. 0. 0. Exploiting this flaw requires network access and user interaction but no privileges, potentially allowing attackers to compromise service confidentiality. The vulnerability is categorized under CWE-199 (Information Management Errors), indicating improper handling of sensitive information. While no known exploits are currently in the wild, successful exploitation could lead to unauthorized data disclosure.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:30:15 UTC

Technical Analysis

CVE-2025-58304 is a permission control vulnerability identified in the file management module of Huawei's HarmonyOS, specifically affecting versions 5.0.1, 5.1.0, and 6.0.0. The vulnerability is classified under CWE-199, which pertains to Information Management Errors, indicating that the system improperly manages sensitive information, potentially exposing it to unauthorized parties. The flaw allows an attacker with network access and requiring user interaction—but no prior privileges—to exploit the vulnerability to compromise the confidentiality of services running on the affected devices. The CVSS 3.1 base score of 4.9 reflects a medium severity level, with the vector indicating that the attack vector is network-based (AV:P), attack complexity is low (AC:L), no privileges are required (PR:N), user interaction is required (UI:R), and the impact is high on confidentiality (C:H), low on integrity (I:L), and none on availability (A:N). The vulnerability does not currently have known exploits in the wild, but the potential for sensitive data leakage remains a concern. The absence of patches at the time of reporting suggests that organizations should implement interim mitigations and monitor for updates from Huawei. The vulnerability's presence in the file management module suggests that attackers might exploit improper permission checks or access controls to read or exfiltrate sensitive files or data managed by the system. Given Huawei's significant market presence in mobile and IoT devices, this vulnerability could have broad implications if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-58304 lies in the potential compromise of service confidentiality. Organizations using Huawei devices running the affected HarmonyOS versions—such as smartphones, tablets, or IoT devices—may face unauthorized disclosure of sensitive information managed by the file system. This could include corporate data, personal user information, or configuration files critical to service operation. The vulnerability does not affect integrity or availability significantly, but confidentiality breaches can lead to secondary impacts such as reputational damage, regulatory penalties under GDPR, and loss of competitive advantage. Sectors with high reliance on Huawei technology, including telecommunications, public administration, and critical infrastructure, may be particularly vulnerable. The requirement for user interaction reduces the risk of widespread automated exploitation but does not eliminate targeted attacks, especially spear-phishing or social engineering campaigns. The medium severity rating suggests that while the threat is not critical, it warrants timely attention to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Monitor Huawei’s official security advisories closely and apply patches or updates for HarmonyOS as soon as they become available to remediate the vulnerability. 2. Restrict network access to devices running affected HarmonyOS versions, especially limiting exposure to untrusted networks or the internet. 3. Implement strict access controls and permissions on file management operations to minimize the risk of unauthorized access. 4. Educate users about the risks of social engineering and the need to avoid interacting with suspicious prompts or links that could trigger exploitation. 5. Deploy network segmentation to isolate Huawei devices from critical systems and sensitive data repositories. 6. Use endpoint detection and response (EDR) tools to monitor for unusual file access patterns or unauthorized data exfiltration attempts. 7. Conduct regular security audits and vulnerability assessments focusing on Huawei device deployments to identify and mitigate potential attack vectors. 8. Consider alternative device or OS options in high-risk environments until the vulnerability is fully addressed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.973Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692917bace4290e3e3b61b6d

Added to database: 11/28/2025, 3:32:10 AM

Last enriched: 12/5/2025, 4:30:15 AM

Last updated: 1/19/2026, 2:09:39 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats