Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66332: CWE-494 Download of Code Without Integrity Check in Huawei HarmonyOS

0
Low
VulnerabilityCVE-2025-66332cvecve-2025-66332cwe-494
Published: Mon Dec 08 2025 (12/08/2025, 08:13:39 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability.

AI-Powered Analysis

AILast updated: 12/08/2025, 08:44:09 UTC

Technical Analysis

CVE-2025-66332 is a vulnerability identified in Huawei's HarmonyOS, specifically within the office service component. The root cause is the download of code without performing integrity checks, classified under CWE-494. This flaw allows an attacker to cause a denial of service (DoS) condition by potentially introducing malformed or malicious code that disrupts the normal operation of the office service, thereby affecting system availability. The vulnerability affects HarmonyOS versions 5.0.1, 5.1.0, and 6.0.0. According to the CVSS 3.1 vector (3.3 base score), exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), and the impact is limited to availability (A:L) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been published yet. The vulnerability's exploitation could lead to temporary denial of service conditions in devices running the affected HarmonyOS versions, potentially disrupting business operations relying on these systems. The lack of integrity checks during code download is a critical security oversight that could be leveraged by attackers with local access to destabilize the system.

Potential Impact

For European organizations, the primary impact is on availability, potentially causing denial of service in devices running the affected HarmonyOS versions. This could disrupt business continuity, especially in environments where Huawei devices are integrated into critical workflows or communication systems. Although the severity is low, repeated or targeted exploitation could degrade user productivity and operational reliability. The requirement for local access and user interaction limits the attack surface, reducing risk for remote or external attackers. However, insider threats or malware that gains local access could exploit this vulnerability. Sectors such as telecommunications, manufacturing, and public services that utilize Huawei hardware and HarmonyOS may experience service interruptions. The absence of confidentiality or integrity impact reduces risks related to data breaches or manipulation but does not eliminate operational risks. Organizations relying on Huawei's ecosystem should monitor for unusual office service behavior and prepare for patch deployment once available.

Mitigation Recommendations

1. Restrict local access to devices running affected HarmonyOS versions by enforcing strict physical and logical access controls. 2. Educate users to avoid interacting with untrusted or suspicious office service prompts that could trigger the vulnerability. 3. Implement endpoint monitoring to detect anomalous behavior or crashes related to the office service. 4. Use application whitelisting and integrity verification tools where possible to detect unauthorized code downloads or modifications. 5. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service events. 6. Engage with Huawei support channels to obtain patches or workarounds as they become available and prioritize timely deployment. 7. Limit installation of unverified third-party applications that could exploit this vulnerability to trigger DoS conditions. 8. Consider network segmentation to isolate critical HarmonyOS devices and reduce the risk of lateral movement by attackers with local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-11-27T02:20:28.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69368c28ddfbd9e35f8b278e

Added to database: 12/8/2025, 8:28:24 AM

Last enriched: 12/8/2025, 8:44:09 AM

Last updated: 12/10/2025, 10:39:10 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats