Vulnerability Details : CVE-2023-25176
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
Products affected by CVE-2023-25176
- cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-25176
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-25176
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | 2024-12-17 |
2.9
|
LOW | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
1.4
|
1.4
|
OpenHarmony | 2024-03-04 |
CWE ids for CVE-2023-25176
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- nvd@nist.gov (Primary)
- scy@openharmony.io (Secondary)
References for CVE-2023-25176
-
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md
你所访问的页面不存在 (404)Patch;Vendor Advisory
Jump to