Description
in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Published: 2026-03-16
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Patch
AI Analysis

Impact

OpenHarmony versions 5.1.0 and earlier contain an out‑of‑bounds write in the arkcompiler_ets_runtime component that can be abused to execute arbitrary code within pre‑installed applications. The flaw is a classic buffer overflow (CWE‑787) and the affected code path can be triggered by a local attacker – the attack does not require remote network access. The potential impact is the execution of malicious code with the privileges of the compromised application, which could compromise system confidentiality, integrity, or availability if the application runs with elevated privileges.

Affected Systems

Affected systems are OpenHarmony builds 5.1.0, 5.0.3 and any earlier releases that meet the same code snapshot. The CPE strings list the products as openatom:openharmony:5.0.3 and openatom:openharmony:5.1.0, indicating that any instance of these versions, whether pre‑installed on consumer devices or embedded in custom appliances, is vulnerable.

Risk and Exploitability

The CVSS score of 5.5 classifies the vulnerability as moderate severity. EPSS is reported as less than 1%, indicating a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, because it requires only local access and can allow code execution, the risk is increased when devices are used by untrusted users or in insecure workspaces. The vulnerability can be exploited only in restricted scenarios, so the attack vector is not widely available but still represents a serious local privilege escalation risk.

Generated by OpenCVE AI on March 17, 2026 at 21:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenHarmony patch or upgrade to a version that addresses the arkcompiler_ets_runtime out-of-bounds write.
  • Verify the device firmware version after applying the update to ensure the vulnerability has been remediated.
  • Monitor the vendor’s security advisories for any new patches or mitigations and apply them promptly.

Generated by OpenCVE AI on March 17, 2026 at 21:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Openatom
Openatom openharmony
CPEs cpe:2.3:o:openatom:openharmony:5.0.3:*:*:*:-:*:*:*
cpe:2.3:o:openatom:openharmony:5.1.0:*:*:*:-:*:*:*
Vendors & Products Openatom
Openatom openharmony

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Openharmony
Openharmony openharmony
Vendors & Products Openharmony
Openharmony openharmony

Mon, 16 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Title arkcompiler_ets_runtime has an out-of-bounds write vulnerability
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Openatom Openharmony
Openharmony Openharmony
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenHarmony

Published:

Updated: 2026-03-16T17:25:26.465Z

Reserved: 2025-07-01T12:16:38.212Z

Link: CVE-2025-41432

cve-icon Vulnrichment

Updated: 2026-03-16T17:25:21.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:58.693

Modified: 2026-03-17T19:58:29.997

Link: CVE-2025-41432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:33Z

Weaknesses