CVE-2024-27897

7.5 HIGH

📋 TL;DR

This CVE describes an input verification vulnerability in the call module that could allow unauthorized access to sensitive information. The vulnerability affects Huawei devices running HarmonyOS, potentially exposing call-related data to attackers. Successful exploitation could compromise service confidentiality.

💻 Affected Systems

Products:
  • Huawei devices with HarmonyOS
Versions: Specific versions not detailed in references, but March 2024 security bulletins indicate affected versions
Operating Systems: HarmonyOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the call module functionality on Huawei devices; exact device models not specified in provided references

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept or access confidential call data, potentially exposing sensitive communications and personal information.

🟠

Likely Case

Unauthorized access to call metadata or limited call-related information, potentially enabling privacy violations.

🟢

If Mitigated

With proper input validation and access controls, the vulnerability would be prevented from being exploited.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and access to the call module; no public exploit details available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references, but March 2024 security updates contain fixes

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2024/3/

Restart Required: Yes

Instructions:

1. Check for available system updates in device settings. 2. Install the latest security update from March 2024 or later. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable unnecessary call features

all

Temporarily disable non-essential call-related features that might be vulnerable

Network segmentation

all

Isolate affected devices from untrusted networks

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access call functionality
  • Monitor call module logs for unusual activity or access patterns

🔍 How to Verify

Check if Vulnerable:

Check device security patch level in settings; if before March 2024, likely vulnerable

Check Version:

Settings > System & updates > Software update (on HarmonyOS devices)

Verify Fix Applied:

Verify security patch level shows March 2024 or later update installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual call module access patterns
  • Failed input validation attempts in call logs

Network Indicators:

  • Unexpected call-related network traffic from unauthorized sources

SIEM Query:

source="call_module" AND (event_type="access_denied" OR event_type="input_validation_failure")

🔗 References

📤 Share & Export