Statement of Vulnerability in ZTE MF910S Product

Original release date: 5 November 2019
Update date:28 November 2019 

 

CVE ID

CVE-2019-3422

 

CVSS 3.0 Base Score

5.9 Medium (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)

 

Statement

In October 2019, ZTE PSIRT received an report about Information leakage vulnerability on MF910S.

Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage.

The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security.

 

Credit

Thanks to Sec Consult Security Lab and security researcher Shen Ying for providing security issues to ZTE PSIRT.

 

Update Records

5 November, 2019, initial.

28 November, 2019, update,Removed security research lab and security researcher from the Statement. 
 

 

Supporting team contacts

1. ZTE GCSC hotline:

0755-26770800

800-830-1118

400-830-1118

2. Product forum at ZTE Support website.

 

ZTE PSIRT

If you need to feedback or report security vulnerabilities related to ZTE products, or get ZTE product security incident response service and vulnerability information, please contact ZTE PSIRT: psirt@zte.com.cn, PGP key ID: FF095577.

[Close]