mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-08 22:18:22 +00:00
118 lines
3.1 KiB
JSON
118 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2022-39070",
|
|
"sourceIdentifier": "psirt@zte.com.cn",
|
|
"published": "2022-11-22T17:15:10.510",
|
|
"lastModified": "2022-11-28T19:29:32.380",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "There is an access control vulnerability in some ZTE PON OLT products. Due to improper access control settings, remote attackers could use the vulnerability to log in to the device and execute any operation."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:zte:zxa10_c350m_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2.1.0",
|
|
"versionEndExcluding": "2.1.0xgp002.4",
|
|
"matchCriteriaId": "DCCC81FA-7965-4FC6-BDC3-84E73B55FA44"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:zte:zxa10_c350m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF27F0FC-404B-4343-94F2-F827EEBAF9BE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:zte:zxa10_c300m_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2.1.0",
|
|
"versionEndExcluding": "2.1.0xgp002.4",
|
|
"matchCriteriaId": "BDA8400C-494A-41BB-9BAC-BF3AF533E050"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:zte:zxa10_c300m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D99A22A2-6EFD-432D-B01E-4DCD956396A3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027824",
|
|
"source": "psirt@zte.com.cn",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |