Chinese tech giant Huawei patched nearly 300 vulnerabilities in its HarmonyOS operating system in 2022.
Huawei smartphones and other devices ran Android until 2019, when the US government barred American companies from selling software and technology to the Chinese firm.
Later that year, Huawei unveiled its new HarmonyOS operating system, which works on a wide range of devices, including phones, tablets, smart TVs, wearables and automotive infotainment systems.
Huawei is aware that in order to compete with Android and iOS, the operating system needs to be secure, which is why the company runs a bug bounty program with significant rewards for critical vulnerabilities and exploit chains.
An analysis conducted by SecurityWeek shows that more than 290 vulnerabilities were patched in HarmonyOS in 2022, including nearly 100 security flaws affecting third-party libraries. The data comes from the monthly security advisories published by the company last year.
Nearly two dozen vulnerabilities have been assigned a ‘critical’ severity rating and 94 have a ‘high’ severity rating.
These vulnerabilities can be exploited for denial-of-service (DoS) attacks, remote code execution, obtaining information, and for privilege escalation.
In comparison, roughly 800 vulnerabilities were patched in Android in 2022, according to data from CVE Details. However, Android is far more popular than HarmonyOS, which means it gets more scrutiny from security researchers.
Through its HarmonyOS bug bounty program, Huawei is offering rewards of up to €1 million for zero-click exploits that lead to arbitrary code execution. Researchers can earn a maximum of €120,000 for new lockscreen bypass methods.
Related: US Bans Huawei, ZTE Telecoms Gear Over Security Risk
Related: Over 75 Vulnerabilities Patched in Android With December 2022 Security Updates

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
Latest News
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- iOS Security Update Patches Exploited Vulnerability in Older iPhones
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- US to Adopt New Restrictions on Using Commercial Spyware
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
