CVE-2024-47398

8.8 HIGH

📋 TL;DR

This vulnerability in OpenHarmony allows a local attacker to perform an out-of-bounds write that can cause the device to become unbootable. It affects OpenHarmony v4.1.2 and earlier versions. Attackers with local access can exploit this to render devices inoperable.

💻 Affected Systems

Products:
  • OpenHarmony
Versions: v4.1.2 and prior versions
Operating Systems: OpenHarmony-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected OpenHarmony versions are vulnerable. This affects devices running the OpenHarmony operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device bricking requiring hardware replacement or reflashing, leading to complete loss of device functionality and data.

🟠

Likely Case

Device becomes unbootable, requiring factory reset or reinstallation of the operating system, causing service disruption and potential data loss.

🟢

If Mitigated

Limited impact if proper access controls prevent local attacker access to vulnerable components.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring physical or local system access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Local attackers (including malicious insiders or compromised accounts) can cause significant disruption by bricking devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the device. The out-of-bounds write vulnerability (CWE-787) needs specific conditions to trigger the boot failure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenHarmony v4.1.3 or later

Vendor Advisory: https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md

Restart Required: No

Instructions:

1. Update OpenHarmony to version 4.1.3 or later. 2. Follow OpenHarmony's official update procedures for your specific device. 3. Verify the update was successful by checking the system version.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and local system access to trusted personnel only to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized local access to devices.
  • Deploy endpoint security solutions that can detect and prevent memory corruption attempts.

🔍 How to Verify

Check if Vulnerable:

Check OpenHarmony version: 'getprop ro.build.version.ohos' or 'cat /etc/openharmony_version'. If version is 4.1.2 or earlier, the system is vulnerable.

Check Version:

getprop ro.build.version.ohos

Verify Fix Applied:

After updating, verify the version is 4.1.3 or later using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System boot failure messages
  • Memory corruption warnings in system logs

Network Indicators:

  • Device going offline unexpectedly
  • Failed heartbeat/health checks from affected devices

SIEM Query:

source="openharmony" AND ("kernel panic" OR "boot failure" OR "out of bounds")

🔗 References

📤 Share & Export