CVE-2025-58313
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-09-11
Assigner: Huawei Technologies
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| huawei | harmonyos | 5.0.1 |
| huawei | harmonyos | 5.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the latest Huawei security update released in September 2025, which addresses this and other vulnerabilities in Huawei devices. [1]
Can you explain this vulnerability to me?
This vulnerability is a race condition in the device standby module. A race condition occurs when multiple processes or threads access shared resources concurrently, leading to unexpected behavior. In this case, it affects the device standby module, potentially causing feature exceptions when exploited.
How can this vulnerability impact me? :
Successful exploitation of this vulnerability may cause feature exceptions in the device standby module, which could impact the device's ability to enter or maintain standby mode properly. According to the CVSS score, it has a moderate impact on availability (Base Score 5.1, with high attack complexity and local attack vector).