Overview
- Description
- There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain sensitive information about the device.
- Source
- psirt@zte.com.cn
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
CVE-2024-22066 There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain sensitive information about the d... https://t.co/4k5dFBmzuV
@VulmonFeeds
29 Oct 2024
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-22066 There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain s… https://t.co/7CCJH3sN0N
@CVEnew
29 Oct 2024
276 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxr10_1800-2s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826BC9EE-082B-4755-8229-94620812A1A0", "versionEndIncluding": "3.00.40" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxr10_1800-2s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA2AC22D-CC1C-4F6E-AFA1-EEC6C2A294DC" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxr10_2800-4_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58284623-2CF8-4993-8AA4-E802E778B116", "versionEndIncluding": "3.00.40" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxr10_2800-4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C5A4FC3A-3137-4B81-85D4-48AC72CF1019" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxr10_3800-8_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F26480A6-D2EA-41D2-85EB-B15FB11ABC50", "versionEndIncluding": "3.00.40" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxr10_3800-8:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6346FA61-050D-4E0A-906C-D2E62D9AA3A1" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxr10_160_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "011635A6-E3F0-47CD-8BBB-2EC37D3E7A34", "versionEndIncluding": "3.00.40" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxr10_160:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6389B69E-A7E2-4BF3-A628-4F5C0ED6EF86" } ], "operator": "OR" } ], "operator": "AND" } ]