First published: Mon Jan 09 2023(Updated: )
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=3.0<=3.0.5 | |
>=3.0<=3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0035 is an authentication bypass vulnerability in the softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions.
CVE-2023-0035 has a severity rating of 7.8 (high).
CVE-2023-0035 affects OpenHarmony-v3.0.5 and prior versions, allowing local attackers to bypass authentication and attack other SAs with high privilege.
There is no available fix or patch for CVE-2023-0035 at the moment. It is recommended to monitor for official updates from OpenHarmony and apply them as soon as they become available.
You can find more information about CVE-2023-0035 in the official OpenHarmony security disclosure: [link](https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md)