ZTE MF910S One Click Update Tool Password information disclosure – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on November 8th, 2019 📆 | 5596 Views ⚑


ZTE MF910S One Click Update Tool Password information disclosure

CVSS Meta Temp ScoreCurrent Exploit Price (≈)CTI Interest Score

A vulnerability, which was classified as problematic, was found in ZTE MF910S (version unknown). Affected is an unknown function of the component One Click Update Tool. The manipulation with an unknown input leads to a information disclosure vulnerability (Password). CWE is classifying the issue as CWE-200. This is going to have an impact on confidentiality.

The weakness was released 11/07/2019. The advisory is shared for download at support.zte.com.cn. This vulnerability is traded as CVE-2019-3422 since 12/31/2018. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 11/08/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure / Password (CWE-200)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

12/31/2018 CVE assigned
11/07/2019 +311 days Advisory disclosed
11/08/2019 +1 days VulDB entry created
11/08/2019 +0 days VulDB last updateVendor: zte.com.cn

Advisory: support.zte.com.cn

CVE: CVE-2019-3422 (🔒)

Created: 11/08/2019 01:00 PM
Complete: 🔍

Use the official API to access entries easily!


Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *