CVE-2019-3422
Summary
| CVE | CVE-2019-3422 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-11-07 20:15:00 UTC |
| Updated | 2020-08-28 01:15:00 UTC |
| Description | The Sec Consult Security Lab reported an information disclosure vulnerability in MF910S product to ZTE PSIRT in October 2019. Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage. The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Zte | Mf910s | - | All | All | All |
| Hardware | Zte | Mf910s | - | All | All | All |
| Operating System | Zte | Mf910s Firmware | - | All | All | All |
| Operating System | Zte | Mf910s Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full Disclosure: SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S | FULLDISC | seclists.org | |
| ZTE Mobile Hotspot MS910S Backdoor / Hardcoded Password ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Security Bulletin Details | CONFIRM | support.zte.com.cn | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.