in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Link | Tags |
---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md | vendor advisory |