Browse all 52 CVE security advisories affecting Honor. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Honor operates primarily as a consumer electronics manufacturer, producing smartphones, tablets, and wearable devices that serve as the core hardware for its ecosystem. Security audits reveal a significant history of vulnerabilities, with fifty-two CVEs currently documented, indicating persistent challenges in software integrity. Historically, common flaw classes include remote code execution, cross-site scripting, and privilege escalation, often stemming from embedded web servers and outdated cryptographic implementations. These defects frequently allow unauthorized access to sensitive user data or system control. While no single catastrophic breach has defined the brand’s public narrative, the cumulative volume of disclosed issues suggests inconsistent patch management and rigorous testing protocols. The security posture remains reactive rather than proactive, with updates often lagging behind vulnerability disclosure timelines. This pattern highlights the need for improved secure development lifecycles within the broader consumer hardware sector to mitigate long-term risks associated with connected devices.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-57839 | HONOR MagicOS 安全漏洞 — MagicOSCWE-200 | 4.0 | Medium | 2025-10-20 |
| CVE-2025-57838 | HONOR MagicOS 安全漏洞 — MagicOSCWE-200 | 4.0 | Medium | 2025-10-20 |
| CVE-2024-47156 | Information Leak Vulnerability in Honor Product — MagicOS | 3.3 | Low | 2024-12-26 |
This page lists every published CVE security advisory associated with Honor. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.