CVE-2022-23139
📋 TL;DR
This vulnerability in ZTE's ZXMP M721 product involves incorrect SFTP folder permission reporting (showing 666 instead of actual permissions), allowing low-privilege users to potentially gain unauthorized access to critical files. It affects organizations using ZTE's ZXMP M721 networking equipment. The discrepancy between displayed and actual permissions could lead to privilege escalation.
💻 Affected Systems
- ZTE ZXMP M721
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative control over the networking device, enabling complete system compromise, data exfiltration, network disruption, or use as a pivot point for further attacks.
Likely Case
Unauthorized users access sensitive configuration files, modify network settings, or extract credentials, leading to partial system compromise.
If Mitigated
With proper access controls and monitoring, impact is limited to unauthorized file viewing but not modification.
🎯 Exploit Status
Exploitation requires valid low-privilege SFTP credentials; attackers would need to identify and access misreported directories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1024444
Restart Required: Yes
Instructions:
1. Contact ZTE support for specific patch. 2. Apply firmware update per vendor instructions. 3. Restart device to activate fixes. 4. Verify SFTP permission reporting matches actual permissions.
🔧 Temporary Workarounds
Restrict SFTP Access
allLimit SFTP access to only necessary administrative users and disable for standard users.
# Configure via ZTE management interface - no universal CLI command
Manual Permission Verification
linuxRegularly audit actual file permissions versus SFTP-reported permissions on critical directories.
# Check actual permissions: ls -la /critical/path
# Compare with SFTP client display
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ZXMP M721 devices from untrusted networks.
- Enhance monitoring of SFTP access logs for unusual file access patterns by low-privilege accounts.
🔍 How to Verify
Check if Vulnerable:
Connect via SFTP with low-privilege account, check if folder permissions show as 666 when actual permissions are more restrictive.
Check Version:
# Check via ZTE management interface or console; no universal command available
Verify Fix Applied:
After patching, verify SFTP-reported permissions match actual file system permissions on critical directories.
📡 Detection & Monitoring
Log Indicators:
- Unusual SFTP access to sensitive directories by low-privilege users
- File modification timestamps on critical config files without authorized changes
Network Indicators:
- SFTP connections from unexpected IP addresses
- Increased SFTP traffic to device
SIEM Query:
source="zte_logs" AND (event="sftp_access" AND user="low_privilege_user" AND path="/critical/*")