Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23143: permission and access control vulnerability in OTCP

0
Medium
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: OTCP

Description

ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this vulnerability to maliciously delete and modify files.

AI-Powered Analysis

AILast updated: 06/24/2025, 01:55:53 UTC

Technical Analysis

CVE-2022-23143 is a permission and access control vulnerability identified in the ZTE OTCP product, specifically affecting version V2.21.40.06RC1. The vulnerability arises from improper permission settings within the product, classified under CWE-732 (Incorrect Permission Assignment for Critical Resource). An attacker who already possesses high-level permissions on the system can exploit this flaw to maliciously delete or modify files, potentially disrupting normal operations or causing data integrity issues. The vulnerability does not require user interaction and can be exploited remotely (Attack Vector: Network). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H. This means that while the attacker must have high privileges (PR:H), the attack complexity is low (AC:L), and there is no impact on confidentiality, but there are high impacts on integrity and availability. No known exploits are reported in the wild as of the published date (December 5, 2022). The vulnerability affects the integrity and availability of the system by allowing unauthorized file modifications or deletions, which could lead to service disruptions or corrupted data. The lack of a patch link suggests that remediation might require vendor engagement or configuration changes. Given the nature of the vulnerability, it is critical that organizations using the affected OTCP version assess their permission configurations and restrict high-level access to trusted administrators only.

Potential Impact

For European organizations, the impact of CVE-2022-23143 can be significant, especially for those relying on ZTE OTCP products in their telecommunications infrastructure or network management systems. The ability for an attacker with high privileges to delete or modify files can lead to service outages, data corruption, or operational disruptions. This could affect critical communication services, potentially impacting business continuity and regulatory compliance, particularly in sectors like telecommunications, finance, and government. Since the vulnerability requires high privileges, the risk is heightened if internal threat actors or compromised administrators exist. Additionally, the integrity and availability impacts could undermine trust in network reliability and data accuracy. Given the interconnected nature of European telecom networks, exploitation in one organization could have cascading effects. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop new methods. Organizations may also face reputational damage and potential fines under GDPR if service disruptions affect personal data processing.

Mitigation Recommendations

1. Conduct a thorough audit of user permissions in the OTCP environment to ensure that only necessary personnel have high-level privileges. 2. Implement strict role-based access control (RBAC) policies to minimize the number of users with elevated permissions. 3. Monitor and log all file modification and deletion activities within the OTCP system to detect suspicious behavior promptly. 4. Isolate OTCP management interfaces from general network access using network segmentation and firewall rules to reduce exposure. 5. Apply any available vendor patches or updates as soon as they are released; if no patch is available, consider temporary mitigations such as disabling unnecessary services or restricting access. 6. Employ multi-factor authentication (MFA) for administrative access to reduce the risk of credential compromise. 7. Regularly back up critical configuration and data files to enable recovery in case of malicious deletion or modification. 8. Train administrators on secure permission management practices and the risks associated with excessive privileges. 9. Engage with ZTE support channels to obtain guidance or patches addressing this vulnerability. 10. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous file operations related to OTCP.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2022-01-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf16c8

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 1:55:53 AM

Last updated: 2/7/2026, 11:21:31 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats