CVE-2026-24918
Address Read Vulnerability in Communication Module Affecting Availability
Publication date: 2026-02-06
Last updated on: 2026-02-10
Assigner: Huawei Technologies
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| huawei | harmonyos | 5.1.0 |
| huawei | emui | 15.0.0 |
| huawei | harmonyos | 4.3.1 |
| huawei | harmonyos | 6.0.0 |
| huawei | harmonyos | 5.1.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The CVE-2026-24918 vulnerability is an address read vulnerability located in the communication module of Huawei devices running HarmonyOS 5.1.1.
This means that the vulnerability involves unauthorized reading of memory addresses within the communication module, which could potentially be exploited.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "Successful exploitation of this vulnerability may impact the system's availability."}, {'type': 'paragraph', 'content': 'This means that an attacker could cause a denial of service or disrupt normal operation of the affected device.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-24918 vulnerability, you should apply the February 2026 security update released by Huawei for their flagship models running HarmonyOS 5.1.1.
This update addresses the address read vulnerability in the communication module and helps prevent potential impacts on system availability.