in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read bypass permission check.
Weakness
The product stores sensitive information without properly limiting read or write access by unauthorized actors.
References