Statement on the handling of vulnerabilities in ZTE MF910 and MF65+ Products

Original release date:  13 August 2019

 

Statement

ZTE noted that at the DEF CON27 meeting, security researcher g Richter mentioned the issue of handling the security vulnerability in MF910 and MF65+ products in his keynote speech titled "Reverse-Engineering 4g Hotspots for Fun, Bugs and Net Financial Loss".

ZTE started analysis and investigation immediately and removed the EOS (end of sale) products from the website. ZTE will update the previously patching time of affected products and the EOS product list in its security bulletins. Please follow up the security bulletin concerning the vulnerability.

link to the MF910 and MF65+ EOS Bulletin: http://support.zte.com.cn/support/news/NewsDetail.aspx?newsId=1011584

Credit

Thank g Richter for attention to security of ZTE products.

 

Update Records

13 August 2019, initial.

16 January 2020Added the link to the MF910 and MF65+ EOS Bulletin.

.

 

Supporting team contacts

1. ZTE GCSC hotline:

0755-26770800

800-830-1118

400-830-1118

2. Product forum at ZTE Support website.

 

ZTE PSIRT

If you need to feedback or report security vulnerabilities related to ZTE products, or get ZTE product security incident response service and vulnerability information, please contact ZTE PSIRT: psirt@zte.com.cn, PGP key ID: FF095577.