Description
in OpenHarmony v6.0 and prior versions allow a local attacker cause DOS.
Published: 2026-05-19
Score: 3.3 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition in OpenHarmony kernel modules allows a local attacker to trigger a denial‑of‑service condition by causing the system to crash. The vulnerability is a classic synchronization flaw (CWE‑364) that can be exploited when concurrent operations access shared kernel data without proper locking, leading to an inconsistent state and eventual kernel panic.

Affected Systems

The affected product is OpenHarmony maintained by the OpenHarmony community. Versions 6.0 and all earlier releases are vulnerable; a local attacker controlling the device may exploit the race condition. No specific patches are identified in the supplied data, so users should verify the latest release channel for a fix.

Risk and Exploitability

The CVSS score of 3.3 indicates low severity, and the EPSS score is not available, suggesting an uncertain but likely low probability of exploitation. The vulnerability requires local access only and is not listed in the CISA KEV catalog, so the risk to remote attackers is absent. Nevertheless, repeated local failures can disrupt device functionality, prompting attackers to use the denial of service to further compromise the device.

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest OpenHarmony release that addresses this race condition
  • Restrict local user privileges and segment the device environment to limit potential local attackers
  • Continuously monitor kernel logs for repeated crashes and enforce alerting or remediation actions when abnormal panics occur

Generated by OpenCVE AI on May 19, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Openharmony
Openharmony openharmony
Vendors & Products Openharmony
Openharmony openharmony

Tue, 19 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description in OpenHarmony v6.0 and prior versions allow a local attacker cause DOS.
Title kernel_linux_common_modules has a Race Condition vulnerability
Weaknesses CWE-364
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Openharmony Openharmony
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenHarmony

Published:

Updated: 2026-05-19T03:08:47.111Z

Reserved: 2026-04-07T08:39:23.556Z

Link: CVE-2026-33565

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T04:16:31.183

Modified: 2026-05-19T04:16:31.183

Link: CVE-2026-33565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T04:30:25Z

Weaknesses