CVE-2024-22069

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated users with common permissions to intercept password change requests and modify administrator credentials on ZTE ZXV10 XT802/ET301 devices. Attackers can gain administrative privileges without proper authorization. Organizations using these specific ZTE terminal products are affected.

💻 Affected Systems

Products:
  • ZTE ZXV10 XT802
  • ZTE ZXV10 ET301
Versions: Specific versions not detailed in advisory; all versions before patch are likely affected
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have valid user credentials (common permissions) and access to the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the device, enabling them to reconfigure network settings, intercept traffic, deploy malware, or use the device as a pivot point into internal networks.

🟠

Likely Case

Privilege escalation where low-privileged users gain administrative access, potentially leading to unauthorized configuration changes, service disruption, or data exposure.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and access controls preventing unauthorized users from reaching the web interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and ability to intercept/modify HTTP requests, which is straightforward with tools like Burp Suite or browser dev tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1036424

Restart Required: Yes

Instructions:

1. Contact ZTE support for latest firmware. 2. Backup current configuration. 3. Upload and apply firmware update via web interface. 4. Reboot device. 5. Verify fix by testing password change functionality.

🔧 Temporary Workarounds

Network segmentation

all

Restrict access to device management interface to authorized administrative networks only

Access control lists

all

Implement firewall rules to limit source IP addresses that can reach the web interface

🧯 If You Can't Patch

  • Monitor for unusual authentication events and password change attempts in device logs
  • Implement multi-factor authentication if supported, or consider replacing vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Test if authenticated non-admin users can intercept and modify password change requests to escalate privileges

Check Version:

Check firmware version in web interface under System > Status or similar menu

Verify Fix Applied:

After patching, verify that password change requests properly validate user permissions and cannot be intercepted/modified

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login
  • Password change events from non-admin users
  • Unusual administrative configuration changes

Network Indicators:

  • HTTP POST requests to password change endpoints from unexpected sources
  • Unusual traffic patterns to/from device management interface

SIEM Query:

source="zte_device" AND (event_type="password_change" AND user_role!="admin")

🔗 References

📤 Share & Export