Description
in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios.
Published: 2026-03-16
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Arbitrary Code Execution
Action: Patch
AI Analysis

Impact

The vulnerability is a type confusion in the OpenHarmony arkcompiler ETS runtime. Vendor notes indicate that using an incompatible type allows a local attacker to execute arbitrary code within pre‑installed applications, leading to potential privilege escalation on the device.

Affected Systems

The flaw exists in OpenHarmony 5.0.3, 5.1.0, and all earlier releases prior to 5.1.0. All devices running these versions of the operating system are affected if they contain the default pre‑installed apps.

Risk and Exploitability

The CVSS base score is 6.3, reflecting moderate severity. The EPSS score is below 1% and the issue is not listed in CISA's KEV catalog. The attack vector is strictly local, requiring access to the device and the ability to trigger the type confusion within a pre‑installed application, which limits exploitation to restricted scenarios.

Generated by OpenCVE AI on March 17, 2026 at 21:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the device’s OpenHarmony version (5.0.3, 5.1.0, or earlier).
  • Apply any vendor‑supplied patch or upgrade to a newer, non‑affected OpenHarmony release.
  • Temporarily disable or uninstall vulnerable pre‑installed applications until a patch is available.
  • Continuously monitor OpenHarmony security advisories for updates on this CVE.

Generated by OpenCVE AI on March 17, 2026 at 21:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Openatom
Openatom openharmony
CPEs cpe:2.3:o:openatom:openharmony:5.0.3:*:*:*:-:*:*:*
cpe:2.3:o:openatom:openharmony:5.1.0:*:*:*:-:*:*:*
Vendors & Products Openatom
Openatom openharmony

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Openharmony
Openharmony openharmony
Vendors & Products Openharmony
Openharmony openharmony

Mon, 16 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios.
Title arkcompiler_ets_runtime has a type confusion vulnerability
Weaknesses CWE-843
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Openatom Openharmony
Openharmony Openharmony
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenHarmony

Published:

Updated: 2026-03-16T17:27:12.753Z

Reserved: 2025-03-02T07:20:06.741Z

Link: CVE-2025-25277

cve-icon Vulnrichment

Updated: 2026-03-16T17:27:05.806Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:57.090

Modified: 2026-03-17T19:56:01.257

Link: CVE-2025-25277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:34Z

Weaknesses