Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64313: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-64313cvecve-2025-64313cwe-362
Published: Fri Nov 28 2025 (11/28/2025, 02:49:02 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 11/28/2025, 03:18:06 UTC

Technical Analysis

CVE-2025-64313 identifies a race condition vulnerability (CWE-362) in Huawei's HarmonyOS office service component, present in versions 5.0.1, 5.1.0, and 6.0.0. The flaw stems from improper synchronization when multiple threads or processes concurrently access shared resources, leading to inconsistent states or resource conflicts. This can be exploited to trigger a denial of service (DoS) condition, causing the affected service to crash or become unresponsive, thereby impacting system availability. The vulnerability requires local access (AV:L) and user interaction (UI:R) but no privileges (PR:N), indicating that an attacker must have some level of user access and induce the condition via interaction. The CVSS vector indicates low attack complexity (AC:L) and unchanged scope (S:U), with limited impact on confidentiality and integrity but a notable impact on availability (A:L). No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability is significant for environments relying on HarmonyOS, especially where the office service is critical for operations. The race condition nature suggests that timing and concurrency control are the root causes, which typically require code fixes to ensure proper locking or atomic operations. Organizations should monitor for unusual office service failures and prepare to deploy patches once available.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of systems running Huawei HarmonyOS, particularly those using the office service. Disruptions could affect productivity and operational continuity, especially in sectors relying on Huawei devices for office or communication tasks. While confidentiality and integrity impacts are limited, denial of service conditions can cause downtime, impacting business processes and potentially leading to financial losses or reputational damage. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread attacks but increasing the threat from insider or physically proximate attackers. Organizations with Huawei-based infrastructure or mobile devices in critical roles may face operational challenges if the vulnerability is exploited. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. The medium severity indicates a moderate risk level, warranting timely mitigation to prevent service interruptions.

Mitigation Recommendations

1. Monitor Huawei's official security advisories and apply patches promptly once released to address the race condition in the office service. 2. Restrict local access to devices running affected HarmonyOS versions by enforcing strong physical security controls and limiting user permissions. 3. Educate users to avoid interacting with untrusted applications or content that could trigger the race condition exploit. 4. Implement application whitelisting and endpoint protection to detect anomalous behavior related to the office service. 5. Conduct regular system and service availability monitoring to quickly identify and respond to service disruptions. 6. Where feasible, consider upgrading to HarmonyOS versions not affected by this vulnerability or alternative platforms until patches are available. 7. Employ concurrency testing and code review practices in environments developing or customizing HarmonyOS-based applications to detect similar synchronization issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-10-30T02:00:28.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692910b5ce4290e3e3b49073

Added to database: 11/28/2025, 3:02:13 AM

Last enriched: 11/28/2025, 3:18:06 AM

Last updated: 12/4/2025, 8:01:30 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats