Huawei Vulnerabilities
Comprehensive security vulnerability database for Huawei products
11
0
7
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-28552 | 7.5 | An attacker can exploit a flaw in the IMS module of Huawei's EMUI to write data outside of the intended memory space, potentially causing the system to crash or become unavailable. This vulnerability requires the attacker to have access to the device, making it more likely to affect users in specific environments. | huaweiemui | Theoretical | about 1 month agoMar 5, 2026 |
| CVE-2026-28536 | 8.1 | This vulnerability allows an attacker to bypass authentication on devices running HarmonyOS, potentially giving them unauthorized access to sensitive data and control over the device. To exploit this, the attacker would need to target the device's authentication module, which could lead to serious breaches of privacy and security. | huaweiharmonyos | Theoretical | about 1 month agoMar 5, 2026 |
| CVE-2022-37008 | 7.5 | This vulnerability allows an attacker to bypass checks on software updates, which means they could install malicious updates that might destabilize the system. To exploit this, the attacker would need access to the device's recovery module, making it crucial to secure physical access and update processes. | huaweiemui | Theoretical | over 3 years agoAug 10, 2022 |
| CVE-2022-37007 | 7.5 | This vulnerability allows an attacker to read sensitive data from memory that they shouldn't have access to, potentially leading to system crashes or instability. To exploit it, the attacker needs to have access to the affected device running Huawei's EMUI software. | huaweiemui | Theoretical | over 3 years agoAug 10, 2022 |
| CVE-2022-37005 | 7.5 | This vulnerability allows an attacker to inject harmful commands into the Settings application, potentially exposing sensitive user data. To exploit this flaw, the attacker would need access to the device or the ability to trick the user into interacting with a malicious app. | huaweiemui | Theoretical | over 3 years agoAug 10, 2022 |
| CVE-2022-37004 | 7.5 | This vulnerability allows an attacker to bypass the initial setup process of the Huawei EMUI settings, potentially leading to unauthorized access to the device's features. To exploit this, the attacker would need physical access to the device during the setup phase. | huaweiemui | Exploit Available | over 3 years agoAug 10, 2022 |
| CVE-2021-40040 | 7.5 | This vulnerability allows an attacker to write data to any location in the memory of Huawei's EMUI system, potentially exposing sensitive information. To exploit this flaw, the attacker needs access to the device, making it a serious risk for users who do not secure their devices properly. | huaweiemui | Exploit Available | over 3 years agoAug 10, 2022 |
| CVE-2021-40030 | 7.5 | This vulnerability allows an attacker to potentially access sensitive data from the My HUAWEI app, which could compromise users' personal information. To exploit this flaw, the attacker would need to trick the app or its users in some way, making it crucial for users to be cautious about how they interact with the app. | huaweiemui | Theoretical | over 3 years agoAug 10, 2022 |
| CVE-2021-40032 | 7.5 | This vulnerability allows an attacker to potentially access sensitive data managed by the voice ID feature in Huawei's HarmonyOS, which could compromise user privacy. To exploit this flaw, the attacker would need to have access to the affected device or system where the voice ID is implemented. | huaweiharmonyos | Theoretical | about 4 years agoJan 10, 2022 |
| CVE-2021-40027 | 7.5 | An attacker can exploit a flaw in Huawei's HarmonyOS that improperly calculates buffer lengths, potentially allowing them to access sensitive data. This vulnerability requires the attacker to have the ability to interact with the affected system, which could lead to serious privacy breaches. | huaweiharmonyos | Exploit Available | about 4 years agoJan 10, 2022 |
| CVE-2021-40014 | 7.5 | An attacker can exploit a heap overflow vulnerability in Huawei's HarmonyOS to potentially access or manipulate sensitive data, compromising its confidentiality. This requires the attacker to run malicious code within the trusted application environment, which may not be easily achievable without prior access to the system. | huaweiharmonyos | Exploit Available | about 4 years agoJan 10, 2022 |
About Huawei Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Huawei products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.