First published: Fri Mar 10 2023(Updated: )
The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=3.1<=3.1.4 | |
Openatom Openharmony | >=3.1<=3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25947 is a null pointer reference vulnerability in the bundle management subsystem within OpenHarmony-v3.1.4 and prior versions.
CVE-2023-25947 allows local attackers to exploit the vulnerability by installing a malicious HAP package, causing a denial-of-service (DoS) attack on the system.
CVE-2023-25947 has a severity rating of 5.5, which is considered medium.
To fix CVE-2023-25947, it is recommended to update OpenHarmony to version 3.1.5 or later, which includes a patch for this vulnerability.
You can find more information about CVE-2023-25947 in the OpenHarmony security disclosure document at https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md.