Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU63188
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23135
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user can send a specially crafted HTTP request and modify the FTP access path, obtain sensitive information, and perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsZXHN F477: 9.0.0P1N28
ZXHN F677: 9.0.0P1N28
CPE2.3 External linkshttp://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1023444
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.