Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown

CVE-2022-43449

Disclosure Date: November 03, 2022 (last updated December 22, 2024)
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
Attacker Value
Unknown

CVE-2022-43495

Disclosure Date: November 03, 2022 (last updated December 22, 2024)
OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot.
Attacker Value
Unknown

CVE-2022-42488

Disclosure Date: October 11, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services.
Attacker Value
Unknown

CVE-2022-42463

Disclosure Date: October 11, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.
Attacker Value
Unknown

CVE-2022-42464

Disclosure Date: October 11, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code execution on the device, gain root privileges, or cause device reboot.
Attacker Value
Unknown

CVE-2022-41686

Disclosure Date: October 11, 2022 (last updated September 10, 2024)
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Attacker Value
Unknown

CVE-2022-38064

Disclosure Date: September 06, 2022 (last updated November 29, 2024)
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. Local attackers can bypass permission control and get sensitive information.
Attacker Value
Unknown

CVE-2022-38081

Disclosure Date: September 06, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.2 and prior versions have a permission bypass vulnerability. LAN attackers can bypass the distributed permission control.To take advantage of this weakness, attackers need another vulnerability to obtain system.
Attacker Value
Unknown

CVE-2022-38701

Disclosure Date: September 06, 2022 (last updated September 10, 2024)
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
Attacker Value
Unknown

CVE-2022-36423

Disclosure Date: September 06, 2022 (last updated September 10, 2024)
OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices.