CVE-2022-23144: access control vulnerability in ZXvSTB
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
AI Analysis
Technical Summary
CVE-2022-23144 is a critical access control vulnerability identified in the ZTE ZXvSTB product line, specifically affecting all versions up to ZXvSTB-CAMSV2.01.02.01. The vulnerability arises from improper permission controls within the system, allowing an unauthenticated remote attacker to delete the default application type on the device. This deletion disrupts the normal operation of the system, potentially causing denial of service or significant degradation of functionality. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is minimal (no data disclosure), but the integrity and availability impacts are high, as attackers can modify system configurations and impair device functionality. The ZXvSTB is a set-top box product, likely used by service providers and consumers for media delivery. The lack of authentication and ease of exploitation make this vulnerability particularly dangerous, as attackers can cause service interruptions or disrupt user experience at scale. No known exploits in the wild have been reported yet, but the high CVSS score of 9.1 underscores the critical nature of this flaw. The absence of available patches at the time of reporting further elevates the risk for affected deployments.
Potential Impact
For European organizations, especially telecommunications providers and media service operators that deploy ZTE ZXvSTB devices, this vulnerability poses a significant risk. Exploitation could lead to widespread service outages, impacting customer satisfaction and potentially causing financial losses due to service-level agreement (SLA) breaches. The disruption of default application types could halt content delivery or degrade interactive services, affecting both residential and commercial users. Additionally, the vulnerability could be leveraged as part of a larger attack chain to disrupt critical communication infrastructure. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices en masse, leading to large-scale denial of service conditions. This could also affect downstream partners and customers relying on these services. The impact extends to regulatory compliance, as service disruptions might violate European telecommunications regulations and data protection laws if service availability is compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating affected ZXvSTB devices from untrusted networks to prevent unauthorized access. Network-level controls such as firewall rules should restrict inbound traffic to management interfaces of these devices. Service providers should engage with ZTE or authorized vendors to obtain and apply firmware updates or patches as soon as they become available. In the absence of patches, deploying compensating controls such as network segmentation, strict access control lists (ACLs), and continuous monitoring for anomalous deletion or configuration changes is critical. Regular auditing of device configurations and logs can help detect exploitation attempts early. Additionally, organizations should implement intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious activity targeting ZXvSTB devices. Finally, educating operational staff about this vulnerability and establishing incident response plans specific to set-top box disruptions will improve readiness and reduce downtime.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-23144: access control vulnerability in ZXvSTB
Description
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
AI-Powered Analysis
Technical Analysis
CVE-2022-23144 is a critical access control vulnerability identified in the ZTE ZXvSTB product line, specifically affecting all versions up to ZXvSTB-CAMSV2.01.02.01. The vulnerability arises from improper permission controls within the system, allowing an unauthenticated remote attacker to delete the default application type on the device. This deletion disrupts the normal operation of the system, potentially causing denial of service or significant degradation of functionality. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is minimal (no data disclosure), but the integrity and availability impacts are high, as attackers can modify system configurations and impair device functionality. The ZXvSTB is a set-top box product, likely used by service providers and consumers for media delivery. The lack of authentication and ease of exploitation make this vulnerability particularly dangerous, as attackers can cause service interruptions or disrupt user experience at scale. No known exploits in the wild have been reported yet, but the high CVSS score of 9.1 underscores the critical nature of this flaw. The absence of available patches at the time of reporting further elevates the risk for affected deployments.
Potential Impact
For European organizations, especially telecommunications providers and media service operators that deploy ZTE ZXvSTB devices, this vulnerability poses a significant risk. Exploitation could lead to widespread service outages, impacting customer satisfaction and potentially causing financial losses due to service-level agreement (SLA) breaches. The disruption of default application types could halt content delivery or degrade interactive services, affecting both residential and commercial users. Additionally, the vulnerability could be leveraged as part of a larger attack chain to disrupt critical communication infrastructure. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices en masse, leading to large-scale denial of service conditions. This could also affect downstream partners and customers relying on these services. The impact extends to regulatory compliance, as service disruptions might violate European telecommunications regulations and data protection laws if service availability is compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating affected ZXvSTB devices from untrusted networks to prevent unauthorized access. Network-level controls such as firewall rules should restrict inbound traffic to management interfaces of these devices. Service providers should engage with ZTE or authorized vendors to obtain and apply firmware updates or patches as soon as they become available. In the absence of patches, deploying compensating controls such as network segmentation, strict access control lists (ACLs), and continuous monitoring for anomalous deletion or configuration changes is critical. Regular auditing of device configurations and logs can help detect exploitation attempts early. Additionally, organizations should implement intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious activity targeting ZXvSTB devices. Finally, educating operational staff about this vulnerability and establishing incident response plans specific to set-top box disruptions will improve readiness and reduce downtime.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2022-01-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6ee00acd01a2492646ef
Added to database: 5/22/2025, 6:37:20 PM
Last enriched: 7/8/2025, 7:26:43 AM
Last updated: 8/14/2025, 10:59:28 PM
Views: 13
Related Threats
CVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.