CVE-2024-22092

in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
Configurations

Configuration 1 (hide)

cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*

History

27 Jan 2025, 17:54

Type Values Removed Values Added
References () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md - () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md - Vendor Advisory
CPE cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*
First Time Openatom
Openatom openharmony

21 Nov 2024, 08:55

Type Values Removed Values Added
References () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md - () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md -

02 Apr 2024, 12:50

Type Values Removed Values Added
Summary
  • (es) OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante remoto omita la verificación de permisos para instalar aplicaciones, aunque estas requieren la acción del usuario.

02 Apr 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-02 07:15

Updated : 2025-01-27 17:54


NVD link : CVE-2024-22092

Mitre link : CVE-2024-22092

CVE.ORG link : CVE-2024-22092


JSON object : View

Products Affected

openatom

  • openharmony
CWE
CWE-290

Authentication Bypass by Spoofing