CVE-2024-56444
Published: 08 January 2025
Summary
CVE-2024-56444 is a high-severity an unspecified weakness vulnerability in Huawei Harmonyos. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 47.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-39 (Process Isolation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Process isolation maintains separate execution domains to prevent cross-process unauthorized access to screen stack data in the UIExtension module.
Access enforcement directly addresses the CWE-264 permissions flaw by requiring enforcement of approved authorizations for sensitive service data access.
Prevents unauthorized information transfer via shared system resources like the screen stack exploited in this cross-process vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network exploit in permissions module directly enables data access from local system and public-facing application exploitation.
NVD Description
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Deeper analysisAI
CVE-2024-56444 is a cross-process screen stack vulnerability in the UIExtension module. Published on January 8, 2025, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-264 (Permissions, Privileges, and Access Controls). Successful exploitation may affect service confidentiality.
Remote attackers require no privileges or user interaction and can exploit the vulnerability over the network with low attack complexity. Exploitation enables high-impact confidentiality violations, such as unauthorized access to sensitive service data, while integrity and availability remain unaffected.
Huawei has published a security bulletin addressing this issue at https://consumer.huawei.com/en/support/bulletin/2025/1/, which likely details affected versions and mitigation steps.
Details
- CWE(s)