CVE-2023-5801

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass identity verification in the face unlock module on affected Huawei devices. Successful exploitation could compromise device integrity and confidentiality by granting unauthorized access. This affects Huawei smartphones and tablets running HarmonyOS with vulnerable face unlock implementations.

💻 Affected Systems

Products:
  • Huawei smartphones and tablets with face unlock capability
Versions: HarmonyOS versions prior to security patches released in November 2023
Operating Systems: HarmonyOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with face unlock enabled and configured. Impact varies based on how face unlock is used for authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing unauthorized access to sensitive data, financial apps, and personal information through bypassed biometric authentication.

🟠

Likely Case

Unauthorized physical access to locked devices, potentially exposing personal data, messages, and applications protected by face unlock.

🟢

If Mitigated

Limited impact if device uses additional authentication factors or if face unlock is disabled for sensitive operations.

🌐 Internet-Facing: LOW - This is primarily a local physical access vulnerability requiring proximity to the device.
🏢 Internal Only: MEDIUM - While requiring physical access, it could be exploited in environments where devices are left unattended or stolen.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical access to the device and knowledge of the specific bypass method. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2023 security patches for HarmonyOS

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2023/11/

Restart Required: Yes

Instructions:

1. Check for system updates in device Settings > System & updates > Software update. 2. Download and install the November 2023 security patch. 3. Restart device after installation completes.

🔧 Temporary Workarounds

Disable Face Unlock

all

Temporarily disable face unlock authentication until patched

Use Additional Authentication Factor

all

Enable PIN/password/pattern as primary unlock method with face unlock as secondary

🧯 If You Can't Patch

  • Disable face unlock entirely and use alternative authentication methods
  • Implement device encryption and remote wipe capabilities for sensitive data protection

🔍 How to Verify

Check if Vulnerable:

Check device HarmonyOS version in Settings > About phone > HarmonyOS version. If version predates November 2023 security patches and face unlock is enabled, device is vulnerable.

Check Version:

Settings > About phone > HarmonyOS version

Verify Fix Applied:

Verify HarmonyOS version includes November 2023 security patches and test face unlock functionality with attempted bypass methods.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed face unlock attempts followed by successful unlock
  • Unusual face unlock patterns or timing

Network Indicators:

  • None - this is a local authentication bypass

SIEM Query:

Not applicable for local device authentication vulnerabilities

🔗 References

📤 Share & Export