Total
25 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-0083 | 1 Openharmony | 1 Openharmony | 2023-03-14 | N/A | 5.5 MEDIUM |
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, OpenHarmony-v3.0.7 and prior versions has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash. | |||||
CVE-2023-22301 | 1 Openharmony | 1 Openharmony | 2023-03-14 | N/A | 7.5 HIGH |
The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system. | |||||
CVE-2023-22436 | 1 Openharmony | 1 Openharmony | 2023-03-14 | N/A | 7.8 HIGH |
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. | |||||
CVE-2023-24465 | 1 Openharmony | 1 Openharmony | 2023-03-14 | N/A | 5.5 MEDIUM |
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. | |||||
CVE-2023-25947 | 1 Openharmony | 1 Openharmony | 2023-03-14 | N/A | 5.5 MEDIUM |
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package. | |||||
CVE-2022-45126 | 1 Openharmony | 1 Openharmony | 2023-01-12 | N/A | 7.8 HIGH |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | |||||
CVE-2023-0035 | 1 Openharmony | 1 Openharmony | 2023-01-12 | N/A | 7.8 HIGH |
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | |||||
CVE-2023-0036 | 1 Openharmony | 1 Openharmony | 2023-01-12 | N/A | 7.8 HIGH |
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | |||||
CVE-2022-43662 | 1 Openharmony | 1 Openharmony | 2023-01-12 | N/A | 7.8 HIGH |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | |||||
CVE-2022-45877 | 1 Openharmony | 1 Openharmony | 2022-12-12 | N/A | 5.3 MEDIUM |
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks. | |||||
CVE-2022-45118 | 1 Openharmony | 1 Openharmony | 2022-12-12 | N/A | 5.5 MEDIUM |
OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions. | |||||
CVE-2022-41802 | 1 Openharmony | 1 Openharmony | 2022-12-12 | N/A | 3.3 LOW |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | |||||
CVE-2022-44455 | 1 Openharmony | 1 Openharmony | 2022-12-12 | N/A | 7.8 HIGH |
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. | |||||
CVE-2022-43449 | 1 Openharmony | 1 Openharmony | 2022-11-06 | N/A | 5.5 MEDIUM |
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000. | |||||
CVE-2022-43451 | 1 Openharmony | 1 Openharmony | 2022-11-06 | N/A | 6.5 MEDIUM |
OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges. | |||||
CVE-2022-43495 | 1 Openharmony | 1 Openharmony | 2022-11-06 | N/A | 7.5 HIGH |
OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot. | |||||
CVE-2022-36423 | 1 Openharmony | 1 Openharmony | 2022-10-28 | N/A | 7.4 HIGH |
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices. | |||||
CVE-2022-38064 | 1 Openharmony | 1 Openharmony | 2022-10-28 | N/A | 5.5 MEDIUM |
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information. | |||||
CVE-2022-42464 | 1 Openharmony | 1 Openharmony | 2022-10-18 | N/A | 7.8 HIGH |
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot. | |||||
CVE-2022-42488 | 1 Openharmony | 1 Openharmony | 2022-10-17 | N/A | 7.8 HIGH |
OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services. |