CVE-2021-37078

7.5 HIGH

📋 TL;DR

This vulnerability in Huawei smartphones allows attackers to cause remote denial of service through an uncaught exception. It affects Huawei devices running HarmonyOS, potentially rendering devices unresponsive or crashing applications. The impact is limited to availability rather than data compromise.

💻 Affected Systems

Products:
  • Huawei smartphones
Versions: HarmonyOS 2.0 versions before 2.0.0.216
Operating Systems: HarmonyOS
Default Config Vulnerable: ⚠️ Yes
Notes: Specific device models not detailed in advisory; all HarmonyOS 2.0 devices in affected version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unresponsiveness requiring reboot, potentially disrupting critical functions if device is used for essential services.

🟠

Likely Case

Application crashes or temporary service disruption affecting user experience but not permanent damage.

🟢

If Mitigated

Minimal impact with proper patching and network segmentation limiting attack surface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Remote exploitation possible but requires specific triggering conditions; no public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HarmonyOS 2.0.0.216 and later

Vendor Advisory: https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727

Restart Required: Yes

Instructions:

1. Check current HarmonyOS version in Settings > System & updates > Software update. 2. If version is before 2.0.0.216, download and install latest update. 3. Reboot device after installation completes.

🔧 Temporary Workarounds

Network segmentation

all

Limit device exposure to untrusted networks to reduce attack surface

Application restrictions

all

Disable unnecessary applications and services that might trigger the vulnerability

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict firewall rules to limit inbound connections to essential services only

🔍 How to Verify

Check if Vulnerable:

Check HarmonyOS version in Settings > System & updates > Software update. If version is earlier than 2.0.0.216, device is vulnerable.

Check Version:

Settings app navigation: System & updates > Software update

Verify Fix Applied:

Confirm HarmonyOS version is 2.0.0.216 or later in Settings > System & updates > Software update.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • System stability reports showing uncaught exceptions
  • Abnormal process termination events

Network Indicators:

  • Unusual inbound traffic patterns to device services
  • Connection attempts followed by service disruption

SIEM Query:

event.category:application AND event.outcome:failure AND process.name:* AND os.name:HarmonyOS

🔗 References

📤 Share & Export