Impact
The vulnerability is a use‑after‑free in the screen management module of HarmonyOS. Improper handling of memory during screen transitions can corrupt the heap, triggering a crash that results in a loss of screen functionality. The impact is primarily an availability problem: affected devices can become unresponsive or must be rebooted to restore normal operation. This defect is classified as a race‑condition weakness (CWE‑362).
Affected Systems
The affected systems are Huawei HarmonyOS versions 5.1.0 and 6.0.0, as identified by the corresponding CPE entries. Any device running these OS releases without the vendor‑provided patch is susceptible to the defect. The issue is confined to the operating system and does not affect hardware components.
Risk and Exploitability
Risk assessment shows a CVSS score of 2.5, indicating a low overall severity. The EPSS score is below 1 %, suggesting a very low probability of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Although no public exploit has been reported, the likely attack vector would involve triggering the UAF condition through malicious or malformed screen operations, possibly requiring local access or privileged interaction. Because the damage is limited to availability, the risk to confidentiality or integrity is none; nevertheless, applying the vendor‑issued patch remains the safest approach.
OpenCVE Enrichment