HUAWEI support

HUAWEI is releasing monthly security updates for flagship models. This security update includes HUAWEI and third-party library patches:

This security update includes the following HUAWEI patches:

CVE Vulnerability Description Impact Severity Affected Version
CVE-2025-68955 Multi-thread race condition vulnerability in the card framework module Successful exploitation of this vulnerability may affect availability. High HarmonyOS6.0.0
CVE-2025-68956
CVE-2025-68957
CVE-2025-68958
CVE-2025-68964 Data verification vulnerability in the HiView module Successful exploitation of this vulnerability may affect availability. Medium HarmonyOS6.0.0, HarmonyOS5.1.0
CVE-2025-68970 Permission verification bypass vulnerability in the media library module Successful exploitation of this vulnerability may affect service confidentiality. Medium HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-68959

This security update includes the following third-party library patches:

CVE Severity Affected Version
CVE-2025-48564 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48565 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48566 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48575 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48580 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48588 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48596 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48603 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48607 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48620 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48628 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48629 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-48633 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2024-49711 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2023-24023 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-0089 High HarmonyOS3.1.0, EMUI13.0.0
CVE-2025-40035 Medium HarmonyOS6.0.0, HarmonyOS5.1.0
CVE-2025-40105 Medium HarmonyOS6.0.0, HarmonyOS5.1.0

Updated on: 2026-01-07

Leaving consumer.huawei.com
After clicking the link, you will enter a third-party website. Huawei is not responsible and has no control over this third party website.
Continue Return