Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68967: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS

0
Medium
VulnerabilityCVE-2025-68967cvecve-2025-68967cwe-264
Published: Wed Jan 14 2026 (01/14/2026, 02:16:57 UTC)
Source: CVE Database V5
Vendor/Project: Huawei
Product: HarmonyOS

Description

CVE-2025-68967 is a medium severity vulnerability in Huawei HarmonyOS version 6. 0. 0 involving improper permission control in the print module. Exploitation requires local access and no user interaction but can lead to integrity and availability impacts with a scope that affects the system. The vulnerability does not impact confidentiality but can cause unauthorized modification or disruption of printing services. No known exploits are currently reported in the wild. European organizations using HarmonyOS devices, especially those relying on printing services, may face operational disruptions or data integrity issues. Mitigation requires Huawei to release patches and organizations to restrict local access and monitor print service usage. Countries with higher Huawei device adoption and strategic reliance on HarmonyOS are more likely to be affected. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:36:08 UTC

Technical Analysis

CVE-2025-68967 is a vulnerability classified under CWE-264, indicating improper permissions, privileges, or access controls within Huawei's HarmonyOS print module, specifically affecting version 6.0.0. The flaw arises from inadequate enforcement of permission checks, allowing an attacker with local access to the device to exploit the print service without requiring any privileges or user interaction. The vulnerability's CVSS 3.1 score is 5.7, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact metrics indicate no confidentiality loss (C:N), but integrity (I:L) and availability (A:L) are impacted, suggesting that an attacker could modify print jobs or disrupt printing services. No patches or known exploits are currently available, but the vulnerability poses a risk to service reliability and data integrity within affected systems. The print module is a critical component for many enterprise environments, and improper permission control can lead to unauthorized manipulation or denial of printing functions. Given the local attack vector, exploitation requires physical or logical local access to the device, limiting remote exploitation possibilities but still posing risks in shared or multi-user environments.

Potential Impact

For European organizations, the vulnerability could lead to disruption of printing services, impacting business operations that rely on timely and accurate print outputs. Integrity issues could result in unauthorized alteration of print jobs, potentially leaking sensitive information or causing misinformation through altered documents. Availability impacts could cause denial of printing services, affecting workflows in sectors such as finance, healthcare, and government where printed documentation remains critical. Although confidentiality is not directly impacted, the potential for integrity and availability compromise can indirectly affect data trustworthiness and operational continuity. Organizations using Huawei HarmonyOS devices, particularly version 6.0.0, in environments with shared device access or insufficient local access controls, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop local access methods or insider threats exploit this vulnerability.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement strict local access controls to limit who can interact with HarmonyOS devices, especially those with printing capabilities. Deploy device usage monitoring to detect unusual print service activity or unauthorized access attempts. Employ network segmentation to isolate devices running HarmonyOS from critical infrastructure to reduce lateral movement risks. Educate users on the risks of local device access and enforce strong physical security policies. Once Huawei releases patches, prioritize timely deployment to affected devices. Consider disabling or restricting the print module on HarmonyOS devices where printing is not essential. Implement endpoint detection and response (EDR) solutions capable of monitoring local privilege escalations or suspicious print service manipulations. Regularly audit device configurations and permissions to ensure compliance with least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
huawei
Date Reserved
2025-12-27T09:06:51.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696703d08330e06716e6aaf5

Added to database: 1/14/2026, 2:47:44 AM

Last enriched: 1/21/2026, 8:36:08 PM

Last updated: 2/5/2026, 9:57:55 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats