Cyber Posture

CVE-2025-0304

High

Published: 07 February 2025

Published
07 February 2025
Modified
11 February 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0008 23.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0304 is a high-severity Use After Free (CWE-416) vulnerability in Openatom Openharmony. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 23.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Implements memory protection safeguards that directly mitigate use-after-free vulnerabilities by preventing unauthorized access to freed memory.

prevent

Requires timely identification, reporting, and patching of the specific use-after-free flaw in OpenHarmony to eliminate the vulnerability.

prevent

Enforces least privilege to restrict the scope of privilege escalation from common permissions to root even if the UAF is partially exploited.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Use-after-free vulnerability directly enables local privilege escalation from low-privileged user to root on OpenHarmony.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.

Deeper analysisAI

CVE-2025-0304 is a use-after-free vulnerability (CWE-416) present in OpenHarmony versions 4.1.2 and prior. The flaw enables a local attacker to upgrade common permissions to root level and leak sensitive information.

The vulnerability can be exploited by a local attacker who has low privileges (PR:L). Exploitation requires low attack complexity (AC:L) and no user interaction (UI:N), but changes scope (S:C) to achieve high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), yielding a CVSS v3.1 base score of 8.8.

Mitigation details are available in the OpenHarmony security advisory at https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md. The CVE was published on 2025-02-07.

Details

CWE(s)

Affected Products

openatom
openharmony
4.1.0 — 4.1.2

CVEs Like This One

CVE-2025-20626Same product: Openatom Openharmony
CVE-2025-24301Same product: Openatom Openharmony
CVE-2025-23409Same product: Openatom Openharmony
CVE-2025-20091Same product: Openatom Openharmony
CVE-2025-23414Same product: Openatom Openharmony
CVE-2025-0587Same product: Openatom Openharmony
CVE-2025-0303Same product: Openatom Openharmony
CVE-2025-22835Same product: Openatom Openharmony
CVE-2025-21084Same product: Openatom Openharmony
CVE-2025-23420Same product: Openatom Openharmony

References