Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58304: CWE-199 Information Management Errors in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-58304cvecve-2025-58304cwe-199
Published: Fri Nov 28 2025 (11/28/2025, 02:58:34 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Permission control vulnerability in the file management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

AI-Powered Analysis

AILast updated: 11/28/2025, 03:43:06 UTC

Technical Analysis

CVE-2025-58304 is a permission control vulnerability categorized under CWE-199 (Information Management Errors) found in the file management module of Huawei's HarmonyOS. This vulnerability arises from improper handling of permission controls, allowing unauthorized users to access confidential service data. The affected versions include HarmonyOS 5.0.1, 5.1.0, and 6.0.0. The CVSS 3.1 base score is 4.9 (medium severity), with the vector indicating that the attack requires physical or local access (AV:P), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), low on integrity (I:L), and none on availability (A:N). This means an attacker with local access and user interaction can exploit the vulnerability to gain unauthorized access to sensitive information, potentially leaking confidential data managed by the file system. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since August 2025. The flaw could be exploited by malicious insiders or attackers who gain local access to devices running the affected HarmonyOS versions, posing a risk to service confidentiality.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of confidential information stored or managed by Huawei HarmonyOS devices. This could include sensitive corporate data, user credentials, or proprietary information, leading to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Since the vulnerability requires local access and user interaction, the risk is somewhat mitigated against remote attackers but remains significant in environments where devices are shared, physically accessible, or susceptible to social engineering. The integrity and availability of systems are minimally affected, but confidentiality breaches can have cascading effects on trust and operational security. Organizations relying on Huawei devices for critical operations or those with Huawei-based mobile endpoints should prioritize addressing this vulnerability to prevent insider threats or targeted attacks exploiting this flaw.

Mitigation Recommendations

1. Monitor Huawei's official security advisories and apply patches promptly once released for the affected HarmonyOS versions. 2. Restrict physical and local access to devices running HarmonyOS, especially in sensitive environments, to reduce the risk of exploitation. 3. Implement strict user access controls and device usage policies to minimize unauthorized user interaction. 4. Employ endpoint detection and response (EDR) solutions to detect anomalous file access or privilege escalation attempts on HarmonyOS devices. 5. Conduct regular security awareness training to reduce the risk of social engineering that could facilitate user interaction required for exploitation. 6. Where feasible, consider segmenting Huawei devices from critical network segments to limit potential data exposure. 7. Audit and monitor logs related to file management operations on affected devices to detect suspicious activity early. 8. Evaluate alternative device management or operating system options if the risk profile is unacceptable and patches are delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.973Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692917bace4290e3e3b61b6d

Added to database: 11/28/2025, 3:32:10 AM

Last enriched: 11/28/2025, 3:43:06 AM

Last updated: 12/4/2025, 12:41:03 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats