Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58305: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-58305cvecve-2025-58305cwe-200
Published: Fri Nov 28 2025 (11/28/2025, 02:59:49 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58305 is an identity authentication bypass vulnerability in the Gallery app of Huawei HarmonyOS version 5. 0. 1. Exploitation of this flaw can lead to unauthorized access to sensitive information, impacting service confidentiality. The vulnerability has a CVSS score of 6. 2, indicating a medium severity level. It requires local access (AV:L), no privileges (PR:N), and no user interaction (UI:N) to exploit, but it does not affect confidentiality, integrity, or availability directly according to the CVSS vector, which is inconsistent with the stated impact. No known exploits are currently reported in the wild. The vulnerability falls under CWE-200, which involves exposure of sensitive information to unauthorized actors. European organizations using Huawei devices running HarmonyOS 5.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:30:34 UTC

Technical Analysis

CVE-2025-58305 identifies a vulnerability in Huawei's HarmonyOS, specifically within the Gallery application version 5.0.1. The flaw is characterized as an identity authentication bypass, which means that an attacker can circumvent the normal authentication mechanisms intended to protect access to the Gallery app. This bypass can lead to unauthorized actors gaining access to sensitive information stored or accessible through the app, thereby compromising service confidentiality. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized entities. The CVSS 3.1 score assigned is 6.2 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and no impact on confidentiality (C:N), integrity (I:N), but high impact on availability (A:H). This vector is somewhat contradictory to the stated impact on confidentiality, suggesting that the vulnerability primarily affects availability or that the CVSS vector may have been mischaracterized. The vulnerability does not require user interaction or privileges, but the attacker must have local access to the device. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates in the near future. The vulnerability's presence in a widely deployed OS like HarmonyOS raises concerns for users and organizations relying on Huawei devices, especially where sensitive data is involved.

Potential Impact

For European organizations, the primary impact of CVE-2025-58305 is the potential unauthorized exposure of sensitive information through the Gallery app on Huawei devices running HarmonyOS 5.0.1. This could lead to breaches of confidentiality, especially in sectors such as government, telecommunications, and critical infrastructure where Huawei devices are used. The vulnerability requires local access, which limits remote exploitation but increases risk in environments where devices may be physically accessible or compromised by insiders. The impact on service confidentiality could result in data leaks, loss of trust, and regulatory non-compliance under GDPR. Additionally, the availability impact indicated by the CVSS vector could disrupt access to the Gallery app, affecting user productivity. Although no known exploits exist yet, the medium severity score suggests that attackers could develop methods to leverage this vulnerability, particularly in targeted attacks. Organizations with Huawei device deployments should be aware of this risk and prepare to respond promptly once patches are available.

Mitigation Recommendations

1. Monitor Huawei's official security advisories closely for patches addressing CVE-2025-58305 and apply updates immediately upon release. 2. Restrict physical and local access to devices running HarmonyOS 5.0.1, especially in sensitive environments, to reduce the risk of local exploitation. 3. Implement strict device usage policies and endpoint security controls to detect and prevent unauthorized access attempts to the Gallery app or other sensitive applications. 4. Conduct regular audits of device configurations and installed applications to ensure no unauthorized modifications or suspicious activities. 5. Educate users about the risks of local device access and encourage secure handling of devices to prevent insider threats. 6. Employ mobile device management (MDM) solutions to enforce security policies and remotely manage Huawei devices. 7. Prepare incident response plans that include scenarios involving local device compromise and unauthorized data access. 8. Consider network segmentation and limiting the exposure of Huawei devices within critical network zones to contain potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.973Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692917bace4290e3e3b61b70

Added to database: 11/28/2025, 3:32:10 AM

Last enriched: 12/5/2025, 4:30:34 AM

Last updated: 1/18/2026, 12:17:34 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats