Description
in OpenHarmony v6.0 and prior versions allow a local attacker arbitrary code execution.
Published: 2026-05-19
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The identified flaw is a use-after-free vulnerability in the filemanagement_storage_service component of OpenHarmony. The flaw permits local attackers to gain arbitrary code execution by freeing an object and subsequently accessing its memory. This weakness aligns with CWE‑416 and provides the attacker with control over application flow, potentially compromising confidentiality, integrity, and availability for the affected system.

Affected Systems

Affected products are OpenHarmony from vendor OpenHarmony, specifically versions 6.0 and all earlier releases. No impact on later versions is indicated; the vendor must verify that the issue is resolved in subsequent releases.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity level. Exploitation probability cannot be assessed from the EPSS as it is not available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires local access to trigger, which suggests that any user with significant privileges on the device could mount an attack once they can manipulate the service. Until an official patch is released, remediation is limited to limiting local access and applying general memory-safety mitigations.

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenHarmony update that resolves the use-after-free issue.
  • If a patch is unavailable, restrict local user privileges to minimize potential exploitation.
  • Enable system memory protection features such as ASLR and stack canaries to reduce the effectiveness of the vulnerability.

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Openharmony
Openharmony openharmony
Vendors & Products Openharmony
Openharmony openharmony

Tue, 19 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description in OpenHarmony v6.0 and prior versions allow a local attacker arbitrary code execution.
Title filemanagement_storage_service has an use after free vulnerability
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Openharmony Openharmony
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenHarmony

Published:

Updated: 2026-05-19T03:08:41.807Z

Reserved: 2026-03-03T06:43:20.313Z

Link: CVE-2026-28733

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T04:16:30.247

Modified: 2026-05-19T04:16:30.247

Link: CVE-2026-28733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T04:30:25Z

Weaknesses