Vulnerabilities (CVE)

Filtered by vendor Huawei Subscribe
Filtered by product Harmonyos
Total 930 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-58277 1 Huawei 1 Harmonyos 2025-10-22 N/A 4.0 MEDIUM
Permission verification bypass vulnerability in the Camera app. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2022-37002 1 Huawei 3 Emui, Harmonyos, Magic Ui 2025-10-20 N/A 9.8 CRITICAL
The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background.
CVE-2025-54654 1 Huawei 1 Harmonyos 2025-10-16 N/A 6.2 MEDIUM
Permission control vulnerability in the Gallery module. Successful exploitation of this vulnerability may affect service confidentiality
CVE-2025-58278 1 Huawei 1 Harmonyos 2025-10-16 N/A 6.2 MEDIUM
Identity authentication bypass vulnerability in the Gallery app. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58282 1 Huawei 1 Harmonyos 2025-10-16 N/A 2.8 LOW
Permission control vulnerability in the camera module. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58283 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.5 MEDIUM
Permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58284 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.9 MEDIUM
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58285 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.3 MEDIUM
Permission control vulnerability in the media module. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58286 1 Huawei 1 Harmonyos 2025-10-16 N/A 3.3 LOW
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58287 1 Huawei 1 Harmonyos 2025-10-16 N/A 7.8 HIGH
Use After Free (UAF) vulnerability in the office service. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58288 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.5 MEDIUM
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58290 1 Huawei 1 Harmonyos 2025-10-16 N/A 3.3 LOW
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58291 1 Huawei 1 Harmonyos 2025-10-16 N/A 3.3 LOW
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58292 1 Huawei 1 Harmonyos 2025-10-16 N/A 3.3 LOW
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58295 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.9 MEDIUM
Buffer overflow vulnerability in the development framework module. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58297 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.9 MEDIUM
Buffer overflow vulnerability in the sensor service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58298 1 Huawei 1 Harmonyos 2025-10-16 N/A 7.3 HIGH
Data processing error vulnerability in the package management module. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58299 1 Huawei 1 Harmonyos 2025-10-16 N/A 8.4 HIGH
Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58289 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.9 MEDIUM
Vulnerability of improper exception handling in the print module. Successful exploitation of this vulnerability may affect availability.
CVE-2025-58293 1 Huawei 1 Harmonyos 2025-10-16 N/A 5.5 MEDIUM
Vulnerability of improper exception handling in the print module. Successful exploitation of this vulnerability may affect availability.