UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26598 | The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. |
Tue, 04 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openatom
Openatom openharmony |
|
| CPEs | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Openharmony
Openharmony openharmony |
Openatom
Openatom openharmony |
Status: PUBLISHED
Assigner: OpenHarmony
Published:
Updated: 2025-03-04T21:18:11.431Z
Reserved: 2023-01-05T12:23:16.628Z
Link: CVE-2023-22436
Updated: 2024-08-02T10:07:06.546Z
Status : Modified
Published: 2023-03-10T11:15:12.220
Modified: 2024-11-21T07:44:48.087
Link: CVE-2023-22436
No data.
OpenCVE Enrichment
No data.
EUVD