CVE-2021-40049

7.5 HIGH

📋 TL;DR

This CVE-2021-40049 is a permission control vulnerability in Huawei's PMS (Package Manager Service) module that allows unauthorized access to sensitive system information. It affects Huawei devices running HarmonyOS and EMUI. Attackers can exploit this to obtain system information without proper authorization.

💻 Affected Systems

Products:
  • Huawei smartphones
  • Huawei tablets
Versions: HarmonyOS 2.0 versions before 2.0.0.230, EMUI 12.0.0 versions before 12.0.0.230
Operating Systems: HarmonyOS, EMUI
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Huawei devices running vulnerable versions of HarmonyOS or EMUI. Requires local access or malicious application installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive system information including device configuration, installed applications, and potentially user data through privilege escalation.

🟠

Likely Case

Unauthorized access to system information that could be used for reconnaissance, profiling devices, or as a stepping stone for further attacks.

🟢

If Mitigated

Limited to no impact if proper access controls and patching are implemented.

🌐 Internet-Facing: MEDIUM - Requires local access or malicious app installation, but could be combined with other exploits.
🏢 Internal Only: HIGH - Malicious apps or compromised devices within the network could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or malicious app installation. No public proof-of-concept available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HarmonyOS 2.0.0.230 and later, EMUI 12.0.0.230 and later

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2022/3/

Restart Required: Yes

Instructions:

1. Check for system updates in device Settings > System & updates > Software update. 2. Download and install available security updates. 3. Restart device after installation completes.

🔧 Temporary Workarounds

Restrict app installations

all

Only install applications from trusted sources like official app stores

Enable app verification

all

Turn on app verification features in device security settings

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and systems
  • Implement strict application whitelisting policies

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > About phone > HarmonyOS/EMUI version

Check Version:

Settings > About phone > HarmonyOS/EMUI version

Verify Fix Applied:

Verify version is HarmonyOS 2.0.0.230+ or EMUI 12.0.0.230+ after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to PMS module
  • Suspicious permission requests from applications

Network Indicators:

  • Unusual outbound connections from affected devices

SIEM Query:

device.os.name:HarmonyOS AND device.os.version:<2.0.0.230 OR device.os.name:EMUI AND device.os.version:<12.0.0.230

🔗 References

📤 Share & Export