Cyber Posture

CVE-2025-68957

High

Published: 14 January 2026

Published
14 January 2026
Modified
15 January 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0000 0.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68957 is a high-severity Race Condition (CWE-362) vulnerability in Huawei Harmonyos. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SC-39 (Process Isolation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through application of Huawei vendor patches directly eliminates the multi-thread race condition vulnerability in the card framework module.

prevent

Process and thread isolation prevents concurrent unauthorized access that enables exploitation of the race condition within the card framework.

prevent

Memory protection mechanisms such as ASLR and stack canaries mitigate exploitation of the race condition that could lead to confidentiality, integrity, and availability impacts.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local race condition (CWE-362) with no privileges required directly enables exploitation for privilege escalation to achieve high CIA impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Multi-thread race condition vulnerability in the card framework module. Impact: Successful exploitation of this vulnerability may affect availability.

Deeper analysisAI

CVE-2025-68957 is a multi-thread race condition vulnerability (CWE-362) in the card framework module. It affects Huawei consumer products, as indicated by security bulletins for general consumer devices, laptops, and wearables. Published on 2026-01-14T03:15:49.277, the vulnerability has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), with successful exploitation potentially affecting availability.

A local attacker with no privileges required can exploit this vulnerability due to its low attack complexity and lack of need for user interaction. Exploitation allows high-impact consequences, including unauthorized access to confidential data, modification of integrity, and disruption of availability across the affected scope.

Huawei has published security advisories detailing mitigations in bulletins available at https://consumer.huawei.com/en/support/bulletin/2026/1/, https://consumer.huawei.com/en/support/bulletinlaptops/2026/1/, and https://consumer.huawei.com/en/support/bulletinwearables/2026/1/. Security practitioners should consult these for patch information and remediation steps specific to impacted devices.

Details

CWE(s)

Affected Products

huawei
harmonyos
6.0.0

CVEs Like This One

CVE-2025-68960Same product: Huawei Harmonyos
CVE-2025-68958Same product: Huawei Harmonyos
CVE-2025-68956Same product: Huawei Harmonyos
CVE-2026-24930Same product: Huawei Harmonyos
CVE-2025-68955Same product: Huawei Harmonyos
CVE-2026-34856Same product: Huawei Harmonyos
CVE-2024-56439Same product: Huawei Harmonyos
CVE-2024-56451Same product: Huawei Harmonyos
CVE-2026-34851Same product: Huawei Harmonyos
CVE-2025-68968Same product: Huawei Harmonyos

References