CVE-2025-46582: CWE-321: Use of Hard-coded Cryptographic Key in ZTE ZXMP M721
A private key disclosure vulnerability exists in ZTE's ZXMP M721 product. A low-privileged user can bypass authorization checks to view the device's communication private key, resulting in key exposure and impacting communication security.
AI Analysis
Technical Summary
CVE-2025-46582 is a vulnerability identified in ZTE's ZXMP M721 telecommunications device, specifically in version ZXMPM721V5.30.020.001P01. The root cause is the use of a hard-coded cryptographic key (CWE-321), which is embedded within the device's firmware and used for securing communications. This key is intended to remain confidential, but due to improper authorization enforcement, a low-privileged user can bypass access controls and retrieve the private key. The vulnerability allows an attacker with network access and low privileges to extract this key without requiring user interaction, enabling potential decryption of sensitive communications or impersonation of legitimate devices. The CVSS v3.1 score of 7.7 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. Although no public exploits are reported yet, the exposure of a private key in a critical network device poses a significant risk to communication security. The vulnerability is particularly concerning for telecom operators and enterprises using ZTE ZXMP M721 devices in their network infrastructure, as it could facilitate man-in-the-middle attacks or unauthorized data interception.
Potential Impact
For European organizations, especially telecom operators and critical infrastructure providers, this vulnerability could lead to severe confidentiality breaches. The exposure of private cryptographic keys undermines the trustworthiness of encrypted communications, potentially allowing attackers to decrypt sensitive data, intercept calls, or impersonate network elements. This could disrupt secure communications, lead to data leakage, and damage organizational reputation. Given the widespread use of ZTE equipment in European telecom networks, exploitation could affect large-scale network segments, impacting service providers and their customers. Additionally, regulatory compliance risks arise under GDPR and other data protection laws due to potential unauthorized data exposure. The vulnerability does not directly affect system integrity or availability but compromises the foundational security of communication channels, which is critical for operational security and privacy.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of ZXMP M721 devices, limiting connections to trusted administrative networks and IP addresses. 2. Implement strict network segmentation to isolate vulnerable devices from general user networks and reduce the attack surface. 3. Monitor device logs and network traffic for unusual access patterns or attempts to retrieve cryptographic keys. 4. Engage with ZTE to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they become available. 5. Where patching is delayed, consider deploying compensating controls such as VPN tunnels or additional encryption layers to protect communications. 6. Conduct a thorough inventory of all ZXMP M721 devices in the network to assess exposure and prioritize remediation. 7. Train network administrators on the risks of hard-coded keys and enforce strict credential management policies. 8. Review and update incident response plans to include scenarios involving cryptographic key compromise.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands
CVE-2025-46582: CWE-321: Use of Hard-coded Cryptographic Key in ZTE ZXMP M721
Description
A private key disclosure vulnerability exists in ZTE's ZXMP M721 product. A low-privileged user can bypass authorization checks to view the device's communication private key, resulting in key exposure and impacting communication security.
AI-Powered Analysis
Technical Analysis
CVE-2025-46582 is a vulnerability identified in ZTE's ZXMP M721 telecommunications device, specifically in version ZXMPM721V5.30.020.001P01. The root cause is the use of a hard-coded cryptographic key (CWE-321), which is embedded within the device's firmware and used for securing communications. This key is intended to remain confidential, but due to improper authorization enforcement, a low-privileged user can bypass access controls and retrieve the private key. The vulnerability allows an attacker with network access and low privileges to extract this key without requiring user interaction, enabling potential decryption of sensitive communications or impersonation of legitimate devices. The CVSS v3.1 score of 7.7 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. Although no public exploits are reported yet, the exposure of a private key in a critical network device poses a significant risk to communication security. The vulnerability is particularly concerning for telecom operators and enterprises using ZTE ZXMP M721 devices in their network infrastructure, as it could facilitate man-in-the-middle attacks or unauthorized data interception.
Potential Impact
For European organizations, especially telecom operators and critical infrastructure providers, this vulnerability could lead to severe confidentiality breaches. The exposure of private cryptographic keys undermines the trustworthiness of encrypted communications, potentially allowing attackers to decrypt sensitive data, intercept calls, or impersonate network elements. This could disrupt secure communications, lead to data leakage, and damage organizational reputation. Given the widespread use of ZTE equipment in European telecom networks, exploitation could affect large-scale network segments, impacting service providers and their customers. Additionally, regulatory compliance risks arise under GDPR and other data protection laws due to potential unauthorized data exposure. The vulnerability does not directly affect system integrity or availability but compromises the foundational security of communication channels, which is critical for operational security and privacy.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of ZXMP M721 devices, limiting connections to trusted administrative networks and IP addresses. 2. Implement strict network segmentation to isolate vulnerable devices from general user networks and reduce the attack surface. 3. Monitor device logs and network traffic for unusual access patterns or attempts to retrieve cryptographic keys. 4. Engage with ZTE to obtain and apply official patches or firmware updates addressing this vulnerability as soon as they become available. 5. Where patching is delayed, consider deploying compensating controls such as VPN tunnels or additional encryption layers to protect communications. 6. Conduct a thorough inventory of all ZXMP M721 devices in the network to assess exposure and prioritize remediation. 7. Train network administrators on the risks of hard-coded keys and enforce strict credential management policies. 8. Review and update incident response plans to include scenarios involving cryptographic key compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2025-04-25T00:28:13.909Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ff324b8f87cfec3dea7cb9
Added to database: 10/27/2025, 8:50:19 AM
Last enriched: 10/27/2025, 8:58:28 AM
Last updated: 10/30/2025, 12:32:56 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Russian Hackers Exploit Adaptix Multi-Platform Pentesting Tool in Ransomware Attacks
HighCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
CriticalCVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.