CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 13, 2026

CVE-2026-34853 | Huawei HarmonyOS/EMUI LBS Module privilege context switching

VulDB Archived Apr 13, 2026 ✓ Full text saved

A vulnerability, which was classified as critical , has been found in Huawei HarmonyOS and EMUI . Affected by this vulnerability is an unknown functionality of the component LBS Module . The manipulation leads to privilege context switching error. This vulnerability is documented as CVE-2026-34853 . The attack needs to be performed locally. There is not any exploit available.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-357072 · CVE-2026-34853 · GCVE-0-2026-34853 HUAWEI HARMONYOS/EMUI LBS MODULE PRIVILEGE CONTEXT SWITCHING HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 7.2 $5k-$25k 0.19+ Summaryinfo A vulnerability, which was classified as critical, was found in Huawei HarmonyOS and EMUI. Affected by this issue is some unknown functionality of the component LBS Module. The manipulation results in privilege context switching. This vulnerability is reported as CVE-2026-34853. The attack requires a local approach. No exploit exists. Detailsinfo A vulnerability was found in Huawei HarmonyOS and EMUI (affected version not known). It has been classified as critical. Affected is some unknown functionality of the component LBS Module. The manipulation with an unknown input leads to a privilege context switching vulnerability. CWE is classifying the issue as CWE-270. The product does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes: Permission bypass vulnerability in the LBS module. Impact: Successful exploitation of this vulnerability may affect availability. The advisory is shared for download at consumer.huawei.com. This vulnerability is traded as CVE-2026-34853 since 03/31/2026. The exploitability is told to be easy. The attack needs to be approached locally. Additional levels of successful authentication are required for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 04/13/2026). The MITRE ATT&CK project declares the attack technique as T1068. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Productinfo Type Smartphone Operating System Vendor Huawei Name EMUI HarmonyOS License commercial Website Vendor: https://www.huawei.com/ CPE 2.3info 🔒 🔒 CPE 2.2info 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 7.2 VulDB Meta Temp Score: 7.2 VulDB Base Score: 6.7 VulDB Temp Score: 6.7 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 7.7 CNA Vector (huawei): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Privilege context switching CWE: CWE-270 / CWE-266 CAPEC: 🔒 ATT&CK: 🔒 Physical: Partially Local: Yes Remote: Partially Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: no mitigation known Status: 🔍 0-Day Time: 🔒 Timelineinfo 03/31/2026 CVE reserved 04/13/2026 +13 days Advisory disclosed 04/13/2026 +0 days VulDB entry created 04/13/2026 +0 days VulDB entry last update Sourcesinfo Vendor: huawei.com Advisory: consumer.huawei.com Status: Confirmed CVE: CVE-2026-34853 (🔒) GCVE (CVE): GCVE-0-2026-34853 GCVE (VulDB): GCVE-100-357072 Entryinfo Created: 04/13/2026 07:38 Changes: 04/13/2026 07:38 (61) Complete: 🔍 Cache ID: 99:544:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 13, 2026
    Archived
    Apr 13, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗