Original release date: 13 August 2019 Statement ZTE noted that at the DEF CON27 meeting, security researcher g Richter mentioned the issue of handling the security vulnerability in MF910 and MF65+ products in his keynote speech titled "Reverse-Engineering 4g Hotspots for Fun, Bugs and Net Financial Loss". ZTE started analysis and investigation immediately and removed the EOS (end of sale) products from the website. ZTE will update the previously patching time of affected products and the EOS product list in its security bulletins. Please follow up the security bulletin concerning the vulnerability. link to the MF910 and MF65+ EOS Bulletin: http://support.zte.com.cn/support/news/NewsDetail.aspx?newsId=1011584 Credit Thank g Richter for attention to security of ZTE products. Update Records 13 August 2019, initial. 16 January 2020, Added the link to the MF910 and MF65+ EOS Bulletin. . Supporting team contacts 1. ZTE GCSC hotline: 0755-26770800 800-830-1118 400-830-1118 2. Product forum at ZTE Support website. ZTE PSIRT If you need to feedback or report security vulnerabilities related to ZTE products, or get ZTE product security incident response service and vulnerability information, please contact ZTE PSIRT: psirt@zte.com.cn, PGP key ID: FF095577.
|