CVE-2024-56443
Published: 08 January 2025
Summary
CVE-2024-56443 is a medium-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Huawei Harmonyos. Its CVSS base score is 6.2 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 24.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-39 (Process Isolation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Process isolation directly prevents cross-process access to the UIExtension screen stack, blocking unauthorized exposure of sensitive service data.
Prevents unintended information transfer via shared system resources like the exploited screen stack used for confidentiality breaches.
Enforces information flow controls between processes to mitigate cross-process leakage of sensitive data in the UIExtension module.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local unauthenticated cross-process information disclosure vulnerability directly enables unauthorized collection of sensitive data from the local system.
NVD Description
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Deeper analysisAI
CVE-2024-56443 is a cross-process screen stack vulnerability in the UIExtension module. Published on January 8, 2025, it has a CVSS v3.1 base score of 6.2 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability affects service confidentiality upon successful exploitation.
A local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. Exploitation remains within the same security scope and results in high confidentiality impact, potentially allowing unauthorized access to sensitive service data.
Huawei's security bulletin provides details on the vulnerability, available at https://consumer.huawei.com/en/support/bulletin/2025/1/. Practitioners should consult this advisory for recommended mitigations or patches.
Details
- CWE(s)