Skip to main content

CVE-2022-23144: access control vulnerability in ZXvSTB

Critical
VulnerabilityCVE-2022-23144cvecve-2022-23144
Published: Fri Sep 23 2022 (09/23/2022, 14:11:59 UTC)
Source: CVE
Vendor/Project: n/a
Product: ZXvSTB

Description

There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:26:43 UTC

Technical Analysis

CVE-2022-23144 is a critical access control vulnerability identified in the ZTE ZXvSTB product line, specifically affecting all versions up to ZXvSTB-CAMSV2.01.02.01. The vulnerability arises from improper permission controls within the system, allowing an unauthenticated remote attacker to delete the default application type on the device. This deletion disrupts the normal operation of the system, potentially causing denial of service or significant degradation of functionality. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is minimal (no data disclosure), but the integrity and availability impacts are high, as attackers can modify system configurations and impair device functionality. The ZXvSTB is a set-top box product, likely used by service providers and consumers for media delivery. The lack of authentication and ease of exploitation make this vulnerability particularly dangerous, as attackers can cause service interruptions or disrupt user experience at scale. No known exploits in the wild have been reported yet, but the high CVSS score of 9.1 underscores the critical nature of this flaw. The absence of available patches at the time of reporting further elevates the risk for affected deployments.

Potential Impact

For European organizations, especially telecommunications providers and media service operators that deploy ZTE ZXvSTB devices, this vulnerability poses a significant risk. Exploitation could lead to widespread service outages, impacting customer satisfaction and potentially causing financial losses due to service-level agreement (SLA) breaches. The disruption of default application types could halt content delivery or degrade interactive services, affecting both residential and commercial users. Additionally, the vulnerability could be leveraged as part of a larger attack chain to disrupt critical communication infrastructure. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices en masse, leading to large-scale denial of service conditions. This could also affect downstream partners and customers relying on these services. The impact extends to regulatory compliance, as service disruptions might violate European telecommunications regulations and data protection laws if service availability is compromised.

Mitigation Recommendations

Immediate mitigation steps include isolating affected ZXvSTB devices from untrusted networks to prevent unauthorized access. Network-level controls such as firewall rules should restrict inbound traffic to management interfaces of these devices. Service providers should engage with ZTE or authorized vendors to obtain and apply firmware updates or patches as soon as they become available. In the absence of patches, deploying compensating controls such as network segmentation, strict access control lists (ACLs), and continuous monitoring for anomalous deletion or configuration changes is critical. Regular auditing of device configurations and logs can help detect exploitation attempts early. Additionally, organizations should implement intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious activity targeting ZXvSTB devices. Finally, educating operational staff about this vulnerability and establishing incident response plans specific to set-top box disruptions will improve readiness and reduce downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2022-01-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a2492646ef

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:26:43 AM

Last updated: 8/14/2025, 10:59:28 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats