Bypass vulnerability in the network search instruction authentication module
Impact: Successful exploitation of this vulnerability can bypass authentication and enable access to some network search functions.
References
| Link | Resource |
|---|---|
| https://consumer.huawei.com/en/support/bulletin/2025/5/ | Vendor Advisory |
Configurations
History
09 May 2025, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-287 | |
| First Time |
Huawei
Huawei harmonyos |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:* | |
| References | () https://consumer.huawei.com/en/support/bulletin/2025/5/ - Vendor Advisory |
06 May 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-06 08:15
Updated : 2025-05-09 19:26
NVD link : CVE-2025-46590
Mitre link : CVE-2025-46590
JSON object : View
Products Affected
huawei
- harmonyos
CWE
CWE-287
Improper Authentication
