CVE-2024-56440
Published: 08 January 2025
Summary
CVE-2024-56440 is a medium-severity Incorrect Default Permissions (CWE-276) vulnerability in Huawei Harmonyos. Its CVSS base score is 6.2 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 21.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved authorizations for access to system resources, addressing the core permission control vulnerability that enables unprivileged local attackers to cause denial of service in the Connectivity module.
Implements least privilege to restrict unprivileged local access to sensitive Connectivity module features, mitigating exploitation that leads to abnormal performance.
Protects against denial-of-service events, limiting the high availability impact from successful exploitation of the permission control vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local permission flaw enables exploitation of the Connectivity module to trigger application/system crash and DoS (T1499.004).
NVD Description
Permission control vulnerability in the Connectivity module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
Deeper analysisAI
CVE-2024-56440 is a permission control vulnerability (CWE-264, CWE-276) in the Connectivity module. Published on 2025-01-08, it carries a CVSS v3.1 base score of 6.2 (AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating a medium-severity issue with high availability impact but no confidentiality or integrity effects. The vulnerability causes features to perform abnormally upon successful exploitation.
A local attacker requires no privileges or user interaction and faces low attack complexity to exploit this issue. Exploitation results in denial of service, disrupting normal operation of affected features in the Connectivity module.
The Huawei security bulletin at https://consumer.huawei.com/en/support/bulletin/2025/1/ provides details on mitigation and patches for affected consumer devices.
Details
- CWE(s)