Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58310: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Huawei HarmonyOS

0
High
VulnerabilityCVE-2025-58310cvecve-2025-58310cwe-843
Published: Fri Nov 28 2025 (11/28/2025, 02:36:41 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58310 is a high-severity permission control vulnerability in Huawei's HarmonyOS distributed component caused by a type confusion flaw (CWE-843). It affects versions 5. 0. 1, 5. 1. 0, and 6. 0. 0. Exploitation requires local access but no privileges or user interaction, potentially allowing attackers to compromise service confidentiality, degrade integrity, and disrupt availability. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:31:28 UTC

Technical Analysis

CVE-2025-58310 is a permission control vulnerability in Huawei HarmonyOS's distributed component, classified under CWE-843 (Access of Resource Using Incompatible Type, or type confusion). This flaw arises when the system incorrectly handles resource types, allowing unauthorized access or manipulation of resources due to improper type validation. The vulnerability affects HarmonyOS versions 5.0.1, 5.1.0, and 6.0.0. The CVSS 3.1 base score is 8.0, indicating high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality is high (C:H), integrity is low (I:L), and availability is high (A:H). This suggests that an attacker with local access can exploit the type confusion flaw to gain unauthorized access to sensitive distributed services, potentially leaking confidential information and causing service disruption or degradation. The vulnerability is rooted in the distributed component's permission control mechanisms, which fail to properly verify resource types before granting access. No patches or exploits are currently publicly available, but the vulnerability is published and reserved as of late 2025. This flaw could be leveraged in environments where HarmonyOS devices or distributed services are deployed, especially in scenarios involving inter-device communication or resource sharing.

Potential Impact

For European organizations, the impact of CVE-2025-58310 could be significant, particularly for those relying on Huawei HarmonyOS devices or infrastructure in distributed computing environments. Confidentiality breaches could expose sensitive corporate or personal data, undermining trust and compliance with data protection regulations such as GDPR. The high impact on availability means critical distributed services could be disrupted, affecting business continuity and operational reliability. Integrity impact is lower but still present, potentially allowing unauthorized modifications that could lead to further exploitation or data corruption. Organizations in sectors such as telecommunications, manufacturing, and public services that utilize Huawei technology may face increased risk. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or compromised local devices could trigger attacks. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score necessitates urgent attention to prevent potential exploitation.

Mitigation Recommendations

1. Monitor Huawei's official channels closely for patches addressing CVE-2025-58310 and apply them immediately upon release. 2. Restrict local access to devices running affected HarmonyOS versions by enforcing strict physical and network access controls, including endpoint security solutions and device authentication. 3. Implement robust monitoring and anomaly detection on distributed components to identify unusual access patterns or resource usage indicative of exploitation attempts. 4. Conduct internal audits and penetration testing focused on distributed components to identify potential exploitation vectors related to type confusion. 5. Educate staff about the risks of local device compromise and enforce policies to minimize insider threats. 6. Where feasible, consider isolating critical distributed services from devices running vulnerable HarmonyOS versions until patches are applied. 7. Collaborate with Huawei support for guidance on interim mitigations or configuration changes that can reduce exposure. 8. Maintain up-to-date inventories of HarmonyOS devices and their versions to prioritize remediation efforts effectively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692910b4ce4290e3e3b4903c

Added to database: 11/28/2025, 3:02:12 AM

Last enriched: 12/5/2025, 4:31:28 AM

Last updated: 1/19/2026, 4:06:13 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats