OpenHarmony CVE-2026-25781 Allows Local DOS, Unrecoverable Impact
A critical denial-of-service vulnerability, CVE-2026-25781, has been identified in OpenHarmony v6.0 and earlier versions. This flaw, attributed to CWE-787 (Improper Neutralization of Special Elements used in a Command), allows a local attacker to trigger a denial of service that is unrecoverable, according to the National Vulnerability Database.
National Vulnerability Database analysis indicates a CVSS score of 8.4 (HIGH) for this vulnerability. The vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N highlights that the attack requires local access and low privileges, but its impact is severe, leading to complete system unavailability without recovery.
For defenders, this means any OpenHarmony device with local user access is at risk. The attacker’s calculus is straightforward: gain local access, execute the exploit, and render the device unusable. CISOs must prioritize patching and strictly control local access to these systems. The unrecoverable nature of the DOS means incident response will involve system re-provisioning, a costly and disruptive exercise.
What This Means For You
- If your organization deploys OpenHarmony devices running v6.0 or prior, you must identify these assets immediately. Prioritize patching CVE-2026-25781 to mitigate the risk of unrecoverable denial of service. Review local access controls for all such devices.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-25781 | DoS | OpenHarmony v6.0 and prior versions |
| CVE-2026-25781 | DoS | Local attacker |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 19, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.