First published: Thu Dec 08 2022(Updated: )
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=3.0<=3.0.6 | |
Openharmony Openharmony | >=3.1<=3.1.2 | |
>=3.1<=3.1.2 | ||
>=3.0<=3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-44455.
The severity of CVE-2022-44455 is high with a CVSS score of 7.8.
OpenHarmony versions 3.0 to 3.0.6 and 3.1 to 3.1.2 are affected by this vulnerability.
The root cause of CVE-2022-44455 is a buffer overflow vulnerability in the appspawn and nwebspawn services of OpenHarmony.
An unprivileged malicious application can exploit this vulnerability to gain code execution within any application installed on the device.