Impact
An out-of-bounds write in a kernel module allows an attacker to corrupt memory, which can undermine system stability and potentially expose sensitive data. This flaw can lead to denial of service by crashing the kernel and may also compromise the confidentiality of stored data depending on the memory contents overwritten. The root cause is a failure to validate array bounds (CWE‑20).
Affected Systems
Systems running Huawei EMUI or HarmonyOS are susceptible to this flaw. The vulnerability applies to all releases that include the affected kernel module; specific affected versions are not listed by the CNA, so any installation of these operating systems may be at risk until a vendor update is applied.
Risk and Exploitability
The CVSS base score of 5.7 indicates moderate risk. No EPSS data is available, and the issue is not catalogued in the CISA KEV list, suggesting that active exploitation evidence is lacking. The likely attack vector is local or requires elevated privileges to load or trigger the vulnerable module, so an attacker with local access or the ability to inject code into the kernel could exploit this weakness. Until a patch is released, the best mitigation is to apply the vendor-provided update or restrict kernel module usage.
OpenCVE Enrichment