CVE-2026-31369: Vulnerability in Honor PcManager
CVE-2026-31369 is a low-severity privilege bypass vulnerability in Honor's PcManager version 1. 0. 0. 2. Exploiting this flaw could impact service availability but does not affect confidentiality or integrity. There is no confirmed patch or official remediation available at this time. The vulnerability requires local access with high attack complexity and no user interaction. No known exploits are reported in the wild.
AI Analysis
Technical Summary
Honor PcManager version 1.0.0.2 contains a privilege bypass vulnerability (CVE-2026-31369) that may allow an attacker to affect service availability. The CVSS 3.1 base score is 3.2, reflecting low severity due to the requirement for local access, high attack complexity, and no impact on confidentiality or integrity. The vulnerability is categorized as a type of privilege bypass, but detailed technical exploitation methods are not provided. No official patch or remediation guidance is currently available from the vendor.
Potential Impact
Successful exploitation of this vulnerability may lead to reduced service availability of the affected PcManager software. There is no impact on confidentiality or integrity according to the CVSS vector. The attack requires local access and is of high complexity, limiting the likelihood of exploitation. No known active exploits have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or mitigation level is provided, users should monitor vendor communications for updates. No specific mitigations are currently documented by the vendor.
CVE-2026-31369: Vulnerability in Honor PcManager
Description
CVE-2026-31369 is a low-severity privilege bypass vulnerability in Honor's PcManager version 1. 0. 0. 2. Exploiting this flaw could impact service availability but does not affect confidentiality or integrity. There is no confirmed patch or official remediation available at this time. The vulnerability requires local access with high attack complexity and no user interaction. No known exploits are reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Honor PcManager version 1.0.0.2 contains a privilege bypass vulnerability (CVE-2026-31369) that may allow an attacker to affect service availability. The CVSS 3.1 base score is 3.2, reflecting low severity due to the requirement for local access, high attack complexity, and no impact on confidentiality or integrity. The vulnerability is categorized as a type of privilege bypass, but detailed technical exploitation methods are not provided. No official patch or remediation guidance is currently available from the vendor.
Potential Impact
Successful exploitation of this vulnerability may lead to reduced service availability of the affected PcManager software. There is no impact on confidentiality or integrity according to the CVSS vector. The attack requires local access and is of high complexity, limiting the likelihood of exploitation. No known active exploits have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or mitigation level is provided, users should monitor vendor communications for updates. No specific mitigations are currently documented by the vendor.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Honor
- Date Reserved
- 2026-03-09T03:44:51.358Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e7244019fe3cd2cdad1052
Added to database: 4/21/2026, 7:16:16 AM
Last enriched: 4/21/2026, 7:31:33 AM
Last updated: 4/21/2026, 8:20:25 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.