Show filters
100 Total Results
Displaying 81-90 of 100
Sort by:
Attacker Value
Unknown

CVE-2023-0036

Disclosure Date: January 09, 2023 (last updated September 10, 2024)
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Attacker Value
Unknown

CVE-2023-0035

Disclosure Date: January 09, 2023 (last updated September 10, 2024)
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Attacker Value
Unknown

CVE-2022-45126

Disclosure Date: January 09, 2023 (last updated September 10, 2024)
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Attacker Value
Unknown

CVE-2022-43662

Disclosure Date: January 09, 2023 (last updated September 10, 2024)
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Attacker Value
Unknown

CVE-2022-45877

Disclosure Date: December 08, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
Attacker Value
Unknown

CVE-2022-45118

Disclosure Date: December 08, 2022 (last updated October 08, 2023)
OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions.
Attacker Value
Unknown

CVE-2022-44455

Disclosure Date: December 08, 2022 (last updated September 10, 2024)
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
Attacker Value
Unknown

CVE-2022-41802

Disclosure Date: December 08, 2022 (last updated September 10, 2024)
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Attacker Value
Unknown

CVE-2022-43451

Disclosure Date: November 03, 2022 (last updated February 24, 2025)
OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.
Attacker Value
Unknown

CVE-2022-43449

Disclosure Date: November 03, 2022 (last updated February 24, 2025)
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.