ID CVE-2022-23144
Summary There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
References
Vulnerable Configurations
  • cpe:2.3:o:zte:zxa10_b76hv3_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b76hv3_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b76hv3:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b76hv3:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b766v2_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b766v2_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b766v2:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b766v2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b800v2_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b800v2_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b800v2:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b800v2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b860av2.1_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b860av2.1_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b860av2.1:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b860av2.1:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b860h_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b860h_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b860h:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b860h:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b866v2-h_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b866v2-h_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b866v2-h:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b866v2-h:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b866v5-w10_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b866v5-w10_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b866v5-w10:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b866v5-w10:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b960gv1_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b960gv1_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b960gv1:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b960gv1:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b710c-a12_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b710c-a12_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b710c-a12:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b710c-a12:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b710s2-a19_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b710s2-a19_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b710s2-a19:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b710s2-a19:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b836ct-a15_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b836ct-a15_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b836ct-a15:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b836ct-a15:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_s100v_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_s100v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_s100v:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_s100v:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_s200a_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_s200a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_s200a:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_s200a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_s200t_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_s200t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_s200t:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_s200t:-:*:*:*:*:*:*:*
  • cpe:2.3:o:zte:zxa10_b700v7_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:zte:zxa10_b700v7_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:zte:zxa10_b700v7:-:*:*:*:*:*:*:*
    cpe:2.3:h:zte:zxa10_b700v7:-:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 08-08-2023 - 14:21
Published 23-09-2022 - 15:15
Last modified 08-08-2023 - 14:21
Back to Top