Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md | third party advisory |