CVE-2022-23144: access control vulnerability in ZXvSTB
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
AI Analysis
Technical Summary
CVE-2022-23144 is a critical access control vulnerability identified in the ZTE ZXvSTB product line, specifically affecting all versions up to ZXvSTB-CAMSV2.01.02.01. The vulnerability arises from improper permission controls within the system, allowing an unauthenticated remote attacker to delete the default application type on the device. This deletion disrupts the normal operation of the system, potentially causing denial of service or significant degradation of functionality. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is minimal (no data disclosure), but the integrity and availability impacts are high, as attackers can modify system configurations and impair device functionality. The ZXvSTB is a set-top box product, likely used by service providers and consumers for media delivery. The lack of authentication and ease of exploitation make this vulnerability particularly dangerous, as attackers can cause service interruptions or disrupt user experience at scale. No known exploits in the wild have been reported yet, but the high CVSS score of 9.1 underscores the critical nature of this flaw. The absence of available patches at the time of reporting further elevates the risk for affected deployments.
Potential Impact
For European organizations, especially telecommunications providers and media service operators that deploy ZTE ZXvSTB devices, this vulnerability poses a significant risk. Exploitation could lead to widespread service outages, impacting customer satisfaction and potentially causing financial losses due to service-level agreement (SLA) breaches. The disruption of default application types could halt content delivery or degrade interactive services, affecting both residential and commercial users. Additionally, the vulnerability could be leveraged as part of a larger attack chain to disrupt critical communication infrastructure. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices en masse, leading to large-scale denial of service conditions. This could also affect downstream partners and customers relying on these services. The impact extends to regulatory compliance, as service disruptions might violate European telecommunications regulations and data protection laws if service availability is compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating affected ZXvSTB devices from untrusted networks to prevent unauthorized access. Network-level controls such as firewall rules should restrict inbound traffic to management interfaces of these devices. Service providers should engage with ZTE or authorized vendors to obtain and apply firmware updates or patches as soon as they become available. In the absence of patches, deploying compensating controls such as network segmentation, strict access control lists (ACLs), and continuous monitoring for anomalous deletion or configuration changes is critical. Regular auditing of device configurations and logs can help detect exploitation attempts early. Additionally, organizations should implement intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious activity targeting ZXvSTB devices. Finally, educating operational staff about this vulnerability and establishing incident response plans specific to set-top box disruptions will improve readiness and reduce downtime.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-23144: access control vulnerability in ZXvSTB
Description
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
AI-Powered Analysis
Technical Analysis
CVE-2022-23144 is a critical access control vulnerability identified in the ZTE ZXvSTB product line, specifically affecting all versions up to ZXvSTB-CAMSV2.01.02.01. The vulnerability arises from improper permission controls within the system, allowing an unauthenticated remote attacker to delete the default application type on the device. This deletion disrupts the normal operation of the system, potentially causing denial of service or significant degradation of functionality. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is minimal (no data disclosure), but the integrity and availability impacts are high, as attackers can modify system configurations and impair device functionality. The ZXvSTB is a set-top box product, likely used by service providers and consumers for media delivery. The lack of authentication and ease of exploitation make this vulnerability particularly dangerous, as attackers can cause service interruptions or disrupt user experience at scale. No known exploits in the wild have been reported yet, but the high CVSS score of 9.1 underscores the critical nature of this flaw. The absence of available patches at the time of reporting further elevates the risk for affected deployments.
Potential Impact
For European organizations, especially telecommunications providers and media service operators that deploy ZTE ZXvSTB devices, this vulnerability poses a significant risk. Exploitation could lead to widespread service outages, impacting customer satisfaction and potentially causing financial losses due to service-level agreement (SLA) breaches. The disruption of default application types could halt content delivery or degrade interactive services, affecting both residential and commercial users. Additionally, the vulnerability could be leveraged as part of a larger attack chain to disrupt critical communication infrastructure. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices en masse, leading to large-scale denial of service conditions. This could also affect downstream partners and customers relying on these services. The impact extends to regulatory compliance, as service disruptions might violate European telecommunications regulations and data protection laws if service availability is compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating affected ZXvSTB devices from untrusted networks to prevent unauthorized access. Network-level controls such as firewall rules should restrict inbound traffic to management interfaces of these devices. Service providers should engage with ZTE or authorized vendors to obtain and apply firmware updates or patches as soon as they become available. In the absence of patches, deploying compensating controls such as network segmentation, strict access control lists (ACLs), and continuous monitoring for anomalous deletion or configuration changes is critical. Regular auditing of device configurations and logs can help detect exploitation attempts early. Additionally, organizations should implement intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious activity targeting ZXvSTB devices. Finally, educating operational staff about this vulnerability and establishing incident response plans specific to set-top box disruptions will improve readiness and reduce downtime.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2022-01-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6ee00acd01a2492646ef
Added to database: 5/22/2025, 6:37:20 PM
Last enriched: 7/8/2025, 7:26:43 AM
Last updated: 2/7/2026, 12:25:39 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.