Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58316: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS

0
High
VulnerabilityCVE-2025-58316cvecve-2025-58316cwe-362
Published: Fri Nov 28 2025 (11/28/2025, 02:31:02 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-58316 is a high-severity denial-of-service (DoS) vulnerability in Huawei HarmonyOS affecting versions 5. 0. 1, 5. 1. 0, and 6. 0. 0. It stems from a race condition (CWE-362) in the video-related system service module due to improper synchronization of shared resources. Exploitation requires local access and no user interaction or privileges, potentially causing system unavailability. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:32:48 UTC

Technical Analysis

CVE-2025-58316 is a denial-of-service vulnerability identified in Huawei's HarmonyOS, specifically within the video-related system service module. The root cause is a race condition (CWE-362) arising from improper synchronization when multiple concurrent executions access shared resources. This flaw allows an attacker with local access to trigger a state where the system service becomes unresponsive or crashes, leading to a denial of service. The vulnerability affects HarmonyOS versions 5.0.1, 5.1.0, and 6.0.0. The CVSS 3.1 base score is 7.3, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact primarily affects availability (A:H), with minor impacts on confidentiality and integrity (C:L, I:L). No public exploits are known, and no patches have been linked yet. The vulnerability highlights the risks of concurrency issues in system-level services, especially in multimedia components that are often complex and resource-intensive. Exploiting this vulnerability could disrupt video services on affected devices, impacting user experience and potentially critical communications or surveillance functions relying on video.

Potential Impact

For European organizations, the primary impact is on availability of Huawei HarmonyOS devices running vulnerable versions, particularly those relying on video-related system services. This could affect sectors using Huawei devices for video conferencing, surveillance, or multimedia processing, leading to service interruptions and operational disruptions. Critical infrastructure or enterprises using Huawei mobile or IoT devices with HarmonyOS may experience degraded service or downtime. Although confidentiality and integrity impacts are low, the denial of service could indirectly affect business continuity and user trust. The requirement for local access limits remote exploitation, but insider threats or compromised local devices could leverage this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate future threat potential once exploit code becomes available.

Mitigation Recommendations

1. Monitor Huawei’s official security advisories for patches addressing CVE-2025-58316 and apply them promptly upon release. 2. Restrict local access to devices running vulnerable HarmonyOS versions by enforcing strict physical and logical access controls, including device lock policies and user authentication. 3. Implement endpoint security solutions that can detect anomalous behavior in system services, particularly those related to video processing. 4. Conduct regular audits of devices to ensure they are running supported and updated OS versions. 5. For critical deployments, consider network segmentation to isolate vulnerable devices from sensitive systems. 6. Educate users and administrators about the risks of local exploitation and encourage reporting of unusual device behavior. 7. If possible, disable or limit video-related system services on devices where such functionality is not required to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-08-28T06:15:10.976Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692910b4ce4290e3e3b49048

Added to database: 11/28/2025, 3:02:12 AM

Last enriched: 12/5/2025, 4:32:48 AM

Last updated: 1/18/2026, 10:29:50 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats