CVE-2021-21732
📋 TL;DR
This vulnerability allows third-party applications on affected ZTE mobile phones to read sensitive files from the proc filesystem without proper authorization due to improper permission settings. Attackers could exploit this to obtain sensitive information from the device. This specifically affects ZTE Axon 11 5G devices with the specified firmware version.
💻 Affected Systems
- ZTE Axon 11 5G
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive system information, process data, or potentially escalate privileges by reading protected proc files containing system state, memory maps, or credential information.
Likely Case
Third-party apps could access information about running processes, system configuration, or other sensitive data that should be restricted, leading to information disclosure.
If Mitigated
With proper access controls, only authorized system components can access sensitive proc files, preventing information leakage to third-party applications.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the device with basic file read permissions; no special privileges needed beyond what normal apps have.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references, but ZTE has published advisories
Vendor Advisory: https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1015064
Restart Required: Yes
Instructions:
1. Check for firmware updates in device settings. 2. Apply any available security updates from ZTE. 3. Restart device after update installation.
🔧 Temporary Workarounds
Restrict app installations
androidOnly install apps from trusted sources like Google Play Store and avoid sideloading unknown applications
Review app permissions
androidRegularly review and restrict unnecessary file access permissions for installed applications
🧯 If You Can't Patch
- Isolate affected devices from accessing sensitive corporate data
- Implement mobile device management (MDM) to control app installations and monitor for suspicious behavior
🔍 How to Verify
Check if Vulnerable:
Check device firmware version in Settings > About Phone > Software Information. Compare with affected version: ZTE/CN_P725A12/P725A12:10/QKQ1.200816.002/20201116.175317:user/release-keys
Check Version:
Not applicable - check through device settings UI
Verify Fix Applied:
Verify firmware version has been updated to a newer version than the vulnerable one listed
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns to /proc directory from non-system apps
- Apps requesting unnecessary file permissions
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Not applicable for typical SIEM systems as this is a mobile device vulnerability