CVE-2024-56435
Published: 08 January 2025
Summary
CVE-2024-56435 is a medium-severity Improper Restriction of Rendered UI Layers or Frames (CWE-1021) vulnerability in Huawei Harmonyos. Its CVSS base score is 6.2 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 22.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-39 (Process Isolation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Process isolation maintains separate execution domains to prevent cross-process unauthorized access to confidential screen stack data in the UIExtension module.
Enforces information flow control policies across process boundaries to block unauthorized leakage of service confidentiality via the screen stack vulnerability.
Flaw remediation through timely application of Huawei patches directly eliminates the cross-process screen stack vulnerability in UIExtension.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local unauthenticated cross-process access to confidential data directly enables T1005 (Data from Local System).
NVD Description
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Deeper analysisAI
CVE-2024-56435 is a cross-process screen stack vulnerability in the UIExtension module, as identified in Huawei's security bulletin. Published on January 8, 2025, it carries a CVSS v3.1 base score of 6.2 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating medium severity with high impact on confidentiality but no impact on integrity or availability. The vulnerability is linked to CWE-1021 (Improper Restriction of Rendered UI Layers or Frames) and insufficient NVD CWE information.
A local attacker with no privileges required can exploit this vulnerability due to its low attack complexity and lack of need for user interaction. Successful exploitation allows unauthorized access to confidential service data across processes, potentially exposing sensitive information without altering or disrupting system operations.
Huawei's consumer support bulletin at https://consumer.huawei.com/en/support/bulletin/2025/1/ provides details on affected devices and recommended patches or mitigations to address the issue. Security practitioners should review the advisory for version-specific updates and apply them promptly to vulnerable UIExtension implementations.
Details
- CWE(s)