in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md | Vendor Advisory |
Configurations
History
12 Aug 2025, 16:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md - Vendor Advisory | |
First Time |
Openatom openharmony
Openatom |
|
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* |
11 Aug 2025, 18:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Aug 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-11 04:15
Updated : 2025-08-12 16:38
NVD link : CVE-2025-27577
Mitre link : CVE-2025-27577
CVE.ORG link : CVE-2025-27577
JSON object : View
Products Affected
openatom
- openharmony
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')