CVE-2025-64311: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS
CVE-2025-64311 is a medium-severity permission control vulnerability in the Notepad module of Huawei HarmonyOS versions 5. 0. 1, 5. 1. 0, and 6. 0. 0. It allows unauthorized actors to access sensitive information without authentication or user interaction, impacting confidentiality but not integrity or availability. Exploitation requires local access with high attack complexity, limiting remote exploitation. No known exploits are currently in the wild.
AI Analysis
Technical Summary
CVE-2025-64311 is a permission control vulnerability identified in the Notepad module of Huawei's HarmonyOS operating system, specifically affecting versions 5.0.1, 5.1.0, and 6.0.0. The vulnerability is categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Technically, this flaw allows an attacker who has local access to the device to bypass permission controls and access sensitive data stored or processed by the Notepad module. The CVSS v3.1 base score of 5.1 indicates a medium severity level, with an attack vector classified as local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:H), with no effect on integrity or availability. Since the attack requires local access and has high complexity, remote exploitation is not feasible, and no known exploits have been reported in the wild as of the publication date. The vulnerability could potentially expose sensitive notes or data stored within the Notepad app, which may include personal or business-critical information. The absence of available patches at the time of reporting suggests that organizations should implement interim mitigations to reduce risk until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-64311 is the unauthorized disclosure of sensitive information stored in the Notepad module on Huawei HarmonyOS devices. This could lead to data breaches involving personal, corporate, or intellectual property data, undermining confidentiality and potentially violating data protection regulations such as GDPR. The requirement for local access and high attack complexity reduces the likelihood of widespread exploitation but does not eliminate risks from insider threats or physical device compromise. Organizations relying on Huawei devices for mobile or IoT deployments may face increased risk, particularly in sectors handling sensitive or regulated data. The exposure could damage organizational reputation, lead to regulatory penalties, and facilitate further targeted attacks if sensitive information is leveraged by adversaries. However, the lack of impact on integrity and availability limits the scope of operational disruption.
Mitigation Recommendations
1. Monitor Huawei’s official security advisories and apply patches promptly once they become available for the affected HarmonyOS versions. 2. Restrict physical and local access to Huawei devices running affected versions, especially in sensitive environments, to reduce the risk of exploitation. 3. Implement device management policies that enforce strong authentication and access controls to limit unauthorized local usage. 4. Conduct regular audits of device configurations and installed applications to detect unauthorized modifications or suspicious activity. 5. Educate users about the risks of local device compromise and encourage secure handling of devices containing sensitive information. 6. Where possible, isolate or limit the use of the Notepad module for storing highly sensitive data until patches are applied. 7. Employ endpoint detection and response (EDR) solutions capable of identifying anomalous local access patterns on Huawei devices. 8. Consider network segmentation and data encryption strategies to minimize the impact of potential data exposure from compromised devices.
Affected Countries
Germany, France, Italy, Spain, United Kingdom
CVE-2025-64311: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS
Description
CVE-2025-64311 is a medium-severity permission control vulnerability in the Notepad module of Huawei HarmonyOS versions 5. 0. 1, 5. 1. 0, and 6. 0. 0. It allows unauthorized actors to access sensitive information without authentication or user interaction, impacting confidentiality but not integrity or availability. Exploitation requires local access with high attack complexity, limiting remote exploitation. No known exploits are currently in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-64311 is a permission control vulnerability identified in the Notepad module of Huawei's HarmonyOS operating system, specifically affecting versions 5.0.1, 5.1.0, and 6.0.0. The vulnerability is categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Technically, this flaw allows an attacker who has local access to the device to bypass permission controls and access sensitive data stored or processed by the Notepad module. The CVSS v3.1 base score of 5.1 indicates a medium severity level, with an attack vector classified as local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:H), with no effect on integrity or availability. Since the attack requires local access and has high complexity, remote exploitation is not feasible, and no known exploits have been reported in the wild as of the publication date. The vulnerability could potentially expose sensitive notes or data stored within the Notepad app, which may include personal or business-critical information. The absence of available patches at the time of reporting suggests that organizations should implement interim mitigations to reduce risk until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-64311 is the unauthorized disclosure of sensitive information stored in the Notepad module on Huawei HarmonyOS devices. This could lead to data breaches involving personal, corporate, or intellectual property data, undermining confidentiality and potentially violating data protection regulations such as GDPR. The requirement for local access and high attack complexity reduces the likelihood of widespread exploitation but does not eliminate risks from insider threats or physical device compromise. Organizations relying on Huawei devices for mobile or IoT deployments may face increased risk, particularly in sectors handling sensitive or regulated data. The exposure could damage organizational reputation, lead to regulatory penalties, and facilitate further targeted attacks if sensitive information is leveraged by adversaries. However, the lack of impact on integrity and availability limits the scope of operational disruption.
Mitigation Recommendations
1. Monitor Huawei’s official security advisories and apply patches promptly once they become available for the affected HarmonyOS versions. 2. Restrict physical and local access to Huawei devices running affected versions, especially in sensitive environments, to reduce the risk of exploitation. 3. Implement device management policies that enforce strong authentication and access controls to limit unauthorized local usage. 4. Conduct regular audits of device configurations and installed applications to detect unauthorized modifications or suspicious activity. 5. Educate users about the risks of local device compromise and encourage secure handling of devices containing sensitive information. 6. Where possible, isolate or limit the use of the Notepad module for storing highly sensitive data until patches are applied. 7. Employ endpoint detection and response (EDR) solutions capable of identifying anomalous local access patterns on Huawei devices. 8. Consider network segmentation and data encryption strategies to minimize the impact of potential data exposure from compromised devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- huawei
- Date Reserved
- 2025-10-30T02:00:28.696Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692910b4ce4290e3e3b4904b
Added to database: 11/28/2025, 3:02:12 AM
Last enriched: 12/5/2025, 4:33:07 AM
Last updated: 1/18/2026, 11:08:33 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
HighCVE-2026-23525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 1Panel-dev 1Panel
MediumCVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.