CVE-2025-26693
BaseFortify
Publication date: 2025-06-08
Last updated on: 2025-06-09
Assigner: OpenHarmony
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openatom | openharmony | to 5.0.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-281 | The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in OpenHarmony v5.0.3 and prior versions allows a local attacker to cause an information leak through the 'get permission' functionality.
What immediate steps should I take to mitigate this vulnerability?
Upgrade OpenHarmony to a version later than v5.0.3 where the vulnerability has been addressed. Since the vulnerability allows a local attacker to cause information leak through get permission, applying the latest security patches or updates from OpenHarmony is recommended to mitigate this issue.
How can this vulnerability impact me? :
The vulnerability can lead to an information leak when exploited by a local attacker, potentially exposing sensitive information. The CVSS score of 3.3 indicates it is a low-severity issue with limited impact.