First published: Tue May 07 2024(Updated: )
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free.
Credit: scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openatom Openharmony | <4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-3759 is high as it allows local attackers to execute arbitrary code in the Trusted Computing Base (TCB).
To fix CVE-2024-3759, upgrade OpenHarmony to version 4.0.1 or later to mitigate the use after free vulnerability.
CVE-2024-3759 affects OpenHarmony version 4.0.0 and all prior versions.
Local attackers with access to the affected OpenHarmony versions can exploit CVE-2024-3759.
CVE-2024-3759 is classified as a use after free vulnerability, leading to arbitrary code execution.