Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64311: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-64311cvecve-2025-64311cwe-200
Published: Fri Nov 28 2025 (11/28/2025, 02:47:19 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Permission control vulnerability in the Notepad module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

AI-Powered Analysis

AILast updated: 11/28/2025, 03:18:19 UTC

Technical Analysis

CVE-2025-64311 identifies a permission control vulnerability categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) within the Notepad module of Huawei's HarmonyOS operating system. The affected versions include 5.0.1, 5.1.0, and 6.0.0. The vulnerability allows unauthorized local actors to access sensitive information stored or processed by the Notepad module without requiring any privileges or user interaction. According to the CVSS 3.1 vector (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), exploitation requires local access (AV:L) and has high attack complexity (AC:H), meaning the attacker must overcome significant hurdles to exploit the flaw. No privileges or user interaction are needed, indicating that once local access is obtained, the attacker can retrieve confidential data. The impact is limited to confidentiality; integrity and availability remain unaffected. There are no known exploits in the wild, and no patches have been linked yet, suggesting the vulnerability is newly disclosed. The flaw stems from insufficient permission controls in the Notepad module, which improperly restrict access to sensitive data, allowing unauthorized disclosure. This vulnerability could be leveraged by attackers with physical or local network access to devices running the affected HarmonyOS versions to extract sensitive notes or related confidential information.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information stored within the Notepad module on Huawei HarmonyOS devices. This could lead to data breaches involving confidential business information, intellectual property, or personal data, undermining privacy and compliance with regulations such as GDPR. The requirement for local access and high attack complexity limits remote exploitation, reducing the risk from external attackers but increasing concern for insider threats or scenarios where devices are physically accessible by adversaries. Sectors with high confidentiality requirements—such as finance, government, healthcare, and critical infrastructure—may be particularly vulnerable if Huawei devices running affected HarmonyOS versions are in use. The exposure of sensitive notes could facilitate further attacks, social engineering, or corporate espionage. Although no integrity or availability impact exists, the confidentiality breach alone can cause reputational damage, regulatory penalties, and operational risks. The absence of known exploits provides a window for mitigation before active exploitation occurs.

Mitigation Recommendations

1. Monitor Huawei’s official security advisories and apply patches promptly once released for the affected HarmonyOS versions. 2. Restrict physical and local network access to devices running HarmonyOS, especially in sensitive environments, to reduce the risk of local exploitation. 3. Implement strict device usage policies, including locking devices when unattended and using strong authentication mechanisms to prevent unauthorized local access. 4. Employ endpoint detection and response (EDR) solutions capable of monitoring unusual local access patterns or attempts to access the Notepad module data. 5. Conduct regular audits of sensitive data stored on devices and consider encrypting sensitive notes or using secure note-taking applications with robust access controls. 6. Train employees on the risks of local device access and enforce policies to minimize insider threat risks. 7. For organizations deploying Huawei devices, consider network segmentation to isolate these devices and limit lateral movement opportunities. 8. Maintain up-to-date inventories of devices and software versions to quickly identify and remediate vulnerable systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-10-30T02:00:28.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692910b4ce4290e3e3b4904b

Added to database: 11/28/2025, 3:02:12 AM

Last enriched: 11/28/2025, 3:18:19 AM

Last updated: 12/4/2025, 11:36:33 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats