CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS through improper input.
Analysis
OpenHarmony versions 5.1.0 and prior contain an improper input validation vulnerability (CWE-20) that allows local attackers with low privileges to trigger a denial of service condition. An authenticated local user can craft malicious input that causes the system to become unresponsive or crash, requiring manual intervention to restore availability. While this vulnerability has a moderate CVSS score of 5.0, the local-only attack vector and requirement for user interaction limit widespread exploitation risk.
Technical Context
The vulnerability resides in OpenHarmony's input handling mechanisms, where insufficient validation of user-supplied data fails to properly sanitize or reject malicious input before processing. OpenHarmony is a distributed operating system developed by the OpenAtom Open Source Foundation, designed for IoT and embedded devices across multiple form factors. The root cause is classified as CWE-20 (Improper Input Validation), indicating that the application does not adequately check, filter, or sanitize input values before they are used in critical operations. This allows an attacker to pass specially crafted data that triggers unexpected behavior in the system's processing logic. The vulnerability affects OpenHarmony versions up to and including v5.1.0, impacting all deployments of these versions across supported device types.
Affected Products
OpenHarmony v5.1.0 and all prior versions are affected by this vulnerability. Affected products include all OpenHarmony-based deployments across supported device categories, including smartphones, tablets, wearables, IoT devices, and automotive systems that ship with OpenHarmony v5.1.0 or earlier. The OpenAtom Open Source Foundation has not yet published a definitive CPE string pattern in public disclosures, but affected instances can be identified via CPE:2.3:o:openatom:openharmony with version constraint less than or equal to 5.1.0. Users should consult the OpenHarmony security advisory at https://openharmony.gitee.io or contact their device manufacturer for specific product version details and available patches.
Remediation
Upgrade affected OpenHarmony installations to version 5.2.0 or later, as this version includes the input validation fixes. Users should check the OpenHarmony security advisory (https://openharmony.gitee.io) and their device manufacturer's support page for available patches, as deployment timelines vary by OEM. Until patches can be deployed, restrict local device access to trusted users and administrators only, implement application-level input validation as a defense-in-depth measure for critical services, disable unnecessary local input mechanisms if they are not required for operation, and monitor system logs for unusual crashes or unresponsiveness patterns that may indicate exploitation attempts. Organizations with IoT deployments should prioritize patching given the local attack vector is more relevant in environments with multiple users or guest access.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208683