CVE-2024-58111

7.5 HIGH

📋 TL;DR

This vulnerability in the ArkUI framework's SVG parsing module allows attackers to cause denial of service by exploiting exception capture failures. It affects applications using ArkUI for SVG rendering, potentially impacting availability of affected services. Huawei devices and applications using vulnerable ArkUI versions are at risk.

💻 Affected Systems

Products:
  • Huawei devices with ArkUI framework
  • Applications using ArkUI for SVG rendering
Versions: Specific versions not detailed in reference; check Huawei advisory for affected versions
Operating Systems: HarmonyOS, Android-based Huawei systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default SVG parsing configuration; requires SVG processing to be triggered

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through denial of service, rendering affected applications or services unavailable to users.

🟠

Likely Case

Application crashes or instability when processing malicious SVG content, leading to temporary service interruptions.

🟢

If Mitigated

Minimal impact with proper input validation and monitoring in place, though some service degradation possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires delivering malicious SVG content to vulnerable parsing module

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Huawei security bulletin for specific patched versions

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2025/4/

Restart Required: Yes

Instructions:

1. Check Huawei security advisory for affected versions. 2. Apply security updates via official channels. 3. Restart affected devices/services after patching.

🔧 Temporary Workarounds

Disable SVG processing

all

Temporarily disable SVG file processing in affected applications if possible

Input validation

all

Implement strict validation of SVG files before processing

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems
  • Deploy web application firewall with SVG content filtering rules

🔍 How to Verify

Check if Vulnerable:

Check device/application version against Huawei security advisory; test with controlled SVG payloads

Check Version:

Check device settings or application about section for version information

Verify Fix Applied:

Verify updated version matches patched version in advisory; test SVG processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to SVG processing
  • Exception errors in ArkUI framework logs
  • Unusual SVG file processing patterns

Network Indicators:

  • Unusual SVG file transfers to affected systems
  • Increased error responses from SVG processing endpoints

SIEM Query:

source="*arkui*" AND (error OR exception OR crash) AND svg

🔗 References

📤 Share & Export