CVE-2026-34851
Published: 13 April 2026
Summary
CVE-2026-34851 is a low-severity Race Condition (CWE-362) vulnerability in Huawei Harmonyos. Its CVSS base score is 2.2 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through application of Huawei patches directly corrects the race condition vulnerability in the event notification module.
Vulnerability scanning identifies systems affected by CVE-2026-34851, enabling targeted patching despite its high attack complexity.
Denial-of-service protections limit the availability impact from local exploitation of the race condition in the event notification module.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Race condition vulnerability directly enables exploitation to cause limited denial of service via application/system crash, matching T1499.004 Application or System Exploitation.
NVD Description
Race condition vulnerability in the event notification module. Impact: Successful exploitation of this vulnerability may affect availability.
Deeper analysisAI
CVE-2026-34851 is a race condition vulnerability (CWE-362) in the event notification module of Huawei consumer products. Published on 2026-04-13, it carries a CVSS v3.1 base score of 2.2 (AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L), reflecting low severity primarily due to its potential to affect availability.
Exploitation requires local access (AV:L), low privileges (PR:L), high attack complexity (AC:H), and user interaction (UI:R). A successful attack can result in a limited denial of service, impacting availability without affecting confidentiality or integrity.
Huawei has issued security bulletins addressing this vulnerability, available at https://consumer.huawei.com/en/support/bulletin/2026/4/ and https://consumer.huawei.com/en/support/bulletinlaptops/2026/4/, which provide details on affected products and recommended mitigations or patches.
Details
- CWE(s)