CVE-2025-66327
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: Huawei Technologies
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| huawei | harmonyos | 5.0.1 |
| huawei | harmonyos | 5.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the network module. A race condition occurs when multiple processes or threads access shared resources concurrently, leading to unexpected behavior. In this case, it affects the network module, potentially causing issues in how network operations are handled.
How can this vulnerability impact me? :
Successful exploitation of this vulnerability may affect service confidentiality and cause a high impact on availability. This means that attackers might disrupt the service, making it unavailable, and potentially compromise the confidentiality of the service.
What immediate steps should I take to mitigate this vulnerability?
Apply the December 2025 Huawei security update, which includes patches addressing this vulnerability and others across various system modules and third-party libraries. [1]