CVE-2025-58305: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS
CVE-2025-58305 is an identity authentication bypass vulnerability in the Gallery app of Huawei HarmonyOS version 5. 0. 1. Exploitation of this flaw can lead to unauthorized access to sensitive information, impacting service confidentiality. The vulnerability has a CVSS score of 6. 2, indicating a medium severity level. It requires local access (AV:L), no privileges (PR:N), and no user interaction (UI:N) to exploit, but it does not affect confidentiality, integrity, or availability directly according to the CVSS vector, which is inconsistent with the stated impact. No known exploits are currently reported in the wild. The vulnerability falls under CWE-200, which involves exposure of sensitive information to unauthorized actors. European organizations using Huawei devices running HarmonyOS 5.
AI Analysis
Technical Summary
CVE-2025-58305 identifies a vulnerability in Huawei's HarmonyOS, specifically within the Gallery application version 5.0.1. The flaw is characterized as an identity authentication bypass, which means that an attacker can circumvent the normal authentication mechanisms intended to protect access to the Gallery app. This bypass can lead to unauthorized actors gaining access to sensitive information stored or accessible through the app, thereby compromising service confidentiality. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized entities. The CVSS 3.1 score assigned is 6.2 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and no impact on confidentiality (C:N), integrity (I:N), but high impact on availability (A:H). This vector is somewhat contradictory to the stated impact on confidentiality, suggesting that the vulnerability primarily affects availability or that the CVSS vector may have been mischaracterized. The vulnerability does not require user interaction or privileges, but the attacker must have local access to the device. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates in the near future. The vulnerability's presence in a widely deployed OS like HarmonyOS raises concerns for users and organizations relying on Huawei devices, especially where sensitive data is involved.
Potential Impact
For European organizations, the primary impact of CVE-2025-58305 is the potential unauthorized exposure of sensitive information through the Gallery app on Huawei devices running HarmonyOS 5.0.1. This could lead to breaches of confidentiality, especially in sectors such as government, telecommunications, and critical infrastructure where Huawei devices are used. The vulnerability requires local access, which limits remote exploitation but increases risk in environments where devices may be physically accessible or compromised by insiders. The impact on service confidentiality could result in data leaks, loss of trust, and regulatory non-compliance under GDPR. Additionally, the availability impact indicated by the CVSS vector could disrupt access to the Gallery app, affecting user productivity. Although no known exploits exist yet, the medium severity score suggests that attackers could develop methods to leverage this vulnerability, particularly in targeted attacks. Organizations with Huawei device deployments should be aware of this risk and prepare to respond promptly once patches are available.
Mitigation Recommendations
1. Monitor Huawei's official security advisories closely for patches addressing CVE-2025-58305 and apply updates immediately upon release. 2. Restrict physical and local access to devices running HarmonyOS 5.0.1, especially in sensitive environments, to reduce the risk of local exploitation. 3. Implement strict device usage policies and endpoint security controls to detect and prevent unauthorized access attempts to the Gallery app or other sensitive applications. 4. Conduct regular audits of device configurations and installed applications to ensure no unauthorized modifications or suspicious activities. 5. Educate users about the risks of local device access and encourage secure handling of devices to prevent insider threats. 6. Employ mobile device management (MDM) solutions to enforce security policies and remotely manage Huawei devices. 7. Prepare incident response plans that include scenarios involving local device compromise and unauthorized data access. 8. Consider network segmentation and limiting the exposure of Huawei devices within critical network zones to contain potential breaches.
Affected Countries
Germany, France, Spain, Italy, United Kingdom, Poland
CVE-2025-58305: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS
Description
CVE-2025-58305 is an identity authentication bypass vulnerability in the Gallery app of Huawei HarmonyOS version 5. 0. 1. Exploitation of this flaw can lead to unauthorized access to sensitive information, impacting service confidentiality. The vulnerability has a CVSS score of 6. 2, indicating a medium severity level. It requires local access (AV:L), no privileges (PR:N), and no user interaction (UI:N) to exploit, but it does not affect confidentiality, integrity, or availability directly according to the CVSS vector, which is inconsistent with the stated impact. No known exploits are currently reported in the wild. The vulnerability falls under CWE-200, which involves exposure of sensitive information to unauthorized actors. European organizations using Huawei devices running HarmonyOS 5.
AI-Powered Analysis
Technical Analysis
CVE-2025-58305 identifies a vulnerability in Huawei's HarmonyOS, specifically within the Gallery application version 5.0.1. The flaw is characterized as an identity authentication bypass, which means that an attacker can circumvent the normal authentication mechanisms intended to protect access to the Gallery app. This bypass can lead to unauthorized actors gaining access to sensitive information stored or accessible through the app, thereby compromising service confidentiality. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized entities. The CVSS 3.1 score assigned is 6.2 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and no impact on confidentiality (C:N), integrity (I:N), but high impact on availability (A:H). This vector is somewhat contradictory to the stated impact on confidentiality, suggesting that the vulnerability primarily affects availability or that the CVSS vector may have been mischaracterized. The vulnerability does not require user interaction or privileges, but the attacker must have local access to the device. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates in the near future. The vulnerability's presence in a widely deployed OS like HarmonyOS raises concerns for users and organizations relying on Huawei devices, especially where sensitive data is involved.
Potential Impact
For European organizations, the primary impact of CVE-2025-58305 is the potential unauthorized exposure of sensitive information through the Gallery app on Huawei devices running HarmonyOS 5.0.1. This could lead to breaches of confidentiality, especially in sectors such as government, telecommunications, and critical infrastructure where Huawei devices are used. The vulnerability requires local access, which limits remote exploitation but increases risk in environments where devices may be physically accessible or compromised by insiders. The impact on service confidentiality could result in data leaks, loss of trust, and regulatory non-compliance under GDPR. Additionally, the availability impact indicated by the CVSS vector could disrupt access to the Gallery app, affecting user productivity. Although no known exploits exist yet, the medium severity score suggests that attackers could develop methods to leverage this vulnerability, particularly in targeted attacks. Organizations with Huawei device deployments should be aware of this risk and prepare to respond promptly once patches are available.
Mitigation Recommendations
1. Monitor Huawei's official security advisories closely for patches addressing CVE-2025-58305 and apply updates immediately upon release. 2. Restrict physical and local access to devices running HarmonyOS 5.0.1, especially in sensitive environments, to reduce the risk of local exploitation. 3. Implement strict device usage policies and endpoint security controls to detect and prevent unauthorized access attempts to the Gallery app or other sensitive applications. 4. Conduct regular audits of device configurations and installed applications to ensure no unauthorized modifications or suspicious activities. 5. Educate users about the risks of local device access and encourage secure handling of devices to prevent insider threats. 6. Employ mobile device management (MDM) solutions to enforce security policies and remotely manage Huawei devices. 7. Prepare incident response plans that include scenarios involving local device compromise and unauthorized data access. 8. Consider network segmentation and limiting the exposure of Huawei devices within critical network zones to contain potential breaches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- huawei
- Date Reserved
- 2025-08-28T06:15:10.973Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692917bace4290e3e3b61b70
Added to database: 11/28/2025, 3:32:10 AM
Last enriched: 12/5/2025, 4:30:34 AM
Last updated: 1/18/2026, 12:17:34 PM
Views: 143
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1119: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumWireshark 4.6.3 Released, (Sat, Jan 17th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.