softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 09 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openatom
Openatom openharmony |
|
| CPEs | cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:* | |
| Vendors & Products |
Openharmony
Openharmony openharmony |
Openatom
Openatom openharmony |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OpenHarmony
Published:
Updated: 2025-04-09T14:09:05.707Z
Reserved: 2023-01-03T07:58:56.834Z
Link: CVE-2023-0035
Updated: 2024-08-02T04:54:32.595Z
Status : Modified
Published: 2023-01-09T03:15:09.503
Modified: 2024-11-21T07:36:26.143
Link: CVE-2023-0035
No data.
OpenCVE Enrichment
No data.