Description
in OpenHarmony v6.0 and prior versions allow a local attacker cause information leak.
Published: 2026-05-19
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition in the multimedia audio framework of OpenHarmony allows a local attacker to read sensitive data that should be protected. The flaw, identified as CWE‑364, arises when concurrent operations access shared data without proper synchronization, causing corruption or unintended data exposure. The impact is that any user or process running on the device can leak internal information, potentially including credentials or private media content, as the vulnerability permits reading of data that the framework should guard.

Affected Systems

The vulnerability affects all OpenHarmony releases up to and including version 6.0. Users deploying OpenHarmony 6.0 or earlier on devices that provide local access to the multimedia audio framework are susceptible. The flaw is not specific to a particular hardware model but applies to the framework as shipped in those OS releases.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, primarily due to the local nature of the exploit. EPSS scoring is not available, so the likelihood of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. Attackers need local device access and the ability to run code with the same privileges as the targeted multimedia service; no remote network vector is documented. Exploitation would involve inducing a race condition by executing competing operations, then reading the leaked data from the intermediate state.

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenHarmony to a version that resolves the race condition in the multimedia audio framework.
  • If an immediate update is unavailable, isolate the framework by restricting local user privileges that can initiate audio processing tasks.
  • Monitor the system for anomalous privilege escalation attempts and ensure that any new binaries interacting with the audio framework enforce proper synchronization to prevent race conditions.

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Openharmony
Openharmony openharmony
Vendors & Products Openharmony
Openharmony openharmony

Tue, 19 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description in OpenHarmony v6.0 and prior versions allow a local attacker cause information leak.
Title multimedia_audio_framework has a Race Condition vulnerability
Weaknesses CWE-364
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Openharmony Openharmony
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenHarmony

Published:

Updated: 2026-05-19T03:08:39.515Z

Reserved: 2026-03-03T06:43:20.297Z

Link: CVE-2026-27766

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T04:16:28.693

Modified: 2026-05-19T04:16:28.693

Link: CVE-2026-27766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T04:30:25Z

Weaknesses