Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46582: CWE-321: Use of Hard-coded Cryptographic Key in ZTE ZXMP M721

0
High
VulnerabilityCVE-2025-46582cvecve-2025-46582cwe-321
Published: Mon Oct 27 2025 (10/27/2025, 08:44:49 UTC)
Source: CVE Database V5
Vendor/Project: ZTE
Product: ZXMP M721

Description

A private key disclosure vulnerability exists in ZTE's ZXMP M721 product. A low-privileged user can bypass authorization checks to view the device's communication private key, resulting in key exposure and impacting communication security.

AI-Powered Analysis

AILast updated: 10/27/2025, 08:58:28 UTC

Technical Analysis

CVE-2025-46582 is a vulnerability identified in ZTE's ZXMP M721 telecommunications device, specifically in version ZXMPM721V5.30.020.001P01. The root cause is the use of a hard-coded cryptographic key (CWE-321), which is embedded within the device's firmware and used for securing communications. This key is intended to remain confidential, but due to improper authorization enforcement, a low-privileged user can bypass access controls and retrieve the private key. The vulnerability allows an attacker with network access and low privileges to extract this key without requiring user interaction, enabling potential decryption of sensitive communications or impersonation of legitimate devices. The CVSS v3.1 score of 7.7 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. Although no public exploits are reported yet, the exposure of a private key in a critical network device poses a significant risk to communication security. The vulnerability is particularly concerning for telecom operators and enterprises using ZTE ZXMP M721 devices in their network infrastructure, as it could facilitate man-in-the-middle attacks or unauthorized data interception.

Potential Impact

For European organizations, especially telecom operators and critical infrastructure providers, this vulnerability could lead to severe confidentiality breaches. The exposure of private cryptographic keys undermines the trustworthiness of encrypted communications, potentially allowing attackers to decrypt sensitive data, intercept calls, or impersonate network elements. This could disrupt secure communications, lead to data leakage, and damage organizational reputation. Given the widespread use of ZTE equipment in European telecom networks, exploitation could affect large-scale network segments, impacting service providers and their customers. Additionally, regulatory compliance risks arise under GDPR and other data protection laws due to potential unauthorized data exposure. The vulnerability does not directly affect system integrity or availability but compromises the foundational security of communication channels, which is critical for operational security and privacy.

Mitigation Recommendations

1. Immediately restrict network access to the management interfaces of ZXMP M721 devices, limiting connections to trusted administrative networks and IP addresses. 2. Implement strict network segmentation to isolate vulnerable devices from general user networks and reduce the attack surface. 3. Monitor device logs and network traffic for unusual access patterns or attempts to retrieve cryptographic keys. 4. Engage with ZTE to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they become available. 5. Where patching is delayed, consider deploying compensating controls such as VPN tunnels or additional encryption layers to protect communications. 6. Conduct a thorough inventory of all ZXMP M721 devices in the network to assess exposure and prioritize remediation. 7. Train network administrators on the risks of hard-coded keys and enforce strict credential management policies. 8. Review and update incident response plans to include scenarios involving cryptographic key compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2025-04-25T00:28:13.909Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff324b8f87cfec3dea7cb9

Added to database: 10/27/2025, 8:50:19 AM

Last enriched: 10/27/2025, 8:58:28 AM

Last updated: 10/30/2025, 12:32:56 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats