2023-08-17 04:00:29 +00:00
{
"id" : "CVE-2023-25647" ,
"sourceIdentifier" : "psirt@zte.com.cn" ,
"published" : "2023-08-17T03:15:09.003" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:49:51.750" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-08-17 04:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\n\n\nThere is a permission and access control vulnerability in some ZTE mobile phones. Due to improper access control, applications in mobile phone could\u00a0monitor\u00a0the touch\u00a0event.\n\n\n\n"
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-08-24 18:00:45 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "psirt@zte.com.cn" ,
"type" : "Secondary" ,
2023-08-24 18:00:45 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM" ,
2023-08-24 18:00:45 +00:00
"attackVector" : "LOCAL" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2023-08-24 18:00:45 +00:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "HIGH" ,
2023-08-24 18:00:45 +00:00
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-08-24 18:00:45 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.0 ,
"impactScore" : 3.6
2023-08-24 18:00:45 +00:00
} ,
2023-08-17 04:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-08-17 04:00:29 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" ,
"baseScore" : 3.3 ,
"baseSeverity" : "LOW" ,
2023-08-17 04:00:29 +00:00
"attackVector" : "LOCAL" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2023-08-17 04:00:29 +00:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "LOW" ,
2023-08-17 04:00:29 +00:00
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-08-17 04:00:29 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.8 ,
"impactScore" : 1.4
2023-08-17 04:00:29 +00:00
}
]
} ,
"weaknesses" : [
2023-08-24 18:00:45 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "psirt@zte.com.cn" ,
"type" : "Secondary" ,
2023-08-24 18:00:45 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-269"
2023-08-24 18:00:45 +00:00
}
]
} ,
2023-08-17 04:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-08-17 04:00:29 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-863"
2023-08-17 04:00:29 +00:00
}
]
}
] ,
2023-08-24 18:00:45 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zte:axon_30_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.0.0b06" ,
"matchCriteriaId" : "6B7C570B-450A-46EF-BE44-C9080D843A58"
2023-08-24 18:00:45 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zte:axon_30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2F14440-A165-43E7-BDA7-EC4C9C95123E"
2023-08-24 18:00:45 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zte:axon_40_pro_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0b16" ,
"matchCriteriaId" : "6BE9D395-28E9-4618-90AC-389D57EFC0BE"
2023-08-24 18:00:45 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zte:axon_40_pro:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A9FA4EE-82AA-4C53-A084-7B7286361253"
2023-08-24 18:00:45 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zte:axon_40_ultra_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.0.0b17" ,
"matchCriteriaId" : "3D7BB985-80B3-49A2-8AE4-6077CB394328"
2023-08-24 18:00:45 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zte:axon_40_ultra:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C9F41AC-BCE6-416B-B11F-D86769525F9D"
2023-08-24 18:00:45 +00:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zte:nubia_z50_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0b19mr" ,
"matchCriteriaId" : "5372F382-E1BF-4446-A2FE-679951C97FA1"
2023-08-24 18:00:45 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-12-08 03:06:42 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zte:nubia_z50:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34767307-B629-4BE7-8530-F604BF5BF459"
2023-08-24 18:00:45 +00:00
}
]
}
]
}
] ,
2023-08-17 04:00:29 +00:00
"references" : [
{
"url" : "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032264" ,
2023-08-24 18:00:45 +00:00
"source" : "psirt@zte.com.cn" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032264" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-08-17 04:00:29 +00:00
}
]
}