CVE-2025-46582

7.7 HIGH

📋 TL;DR

A low-privileged user can bypass authorization checks in ZTE's ZXMP M721 product to view the device's communication private key. This exposes cryptographic keys that secure communications, potentially allowing attackers to decrypt or impersonate legitimate traffic. Organizations using affected ZXMP M721 devices are at risk.

💻 Affected Systems

Products:
  • ZTE ZXMP M721
Versions: Specific versions not detailed in advisory; all versions before patch are presumed vulnerable
Operating Systems: Embedded/Proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with low-privileged user accounts enabled; exact configuration requirements not specified in available reference.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to encrypted communications, enabling man-in-the-middle attacks, data interception, and impersonation of legitimate devices across the network.

🟠

Likely Case

Internal malicious actors or compromised low-privileged accounts steal private keys, leading to unauthorized access to sensitive communications and potential lateral movement.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated segments, though key compromise still requires key rotation and investigation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged user access; authorization bypass suggests straightforward attack path once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check vendor advisory for exact version

Vendor Advisory: https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/2594779029512220847

Restart Required: Yes

Instructions:

1. Access ZTE support portal using provided URL. 2. Download and apply the security patch for ZXMP M721. 3. Restart the device to activate changes. 4. Verify patch installation via version check.

🔧 Temporary Workarounds

Restrict Low-Privileged User Access

all

Disable or remove unnecessary low-privileged user accounts to prevent exploitation.

Specific commands depend on device CLI; consult ZTE documentation for user management commands.

Network Segmentation

all

Isolate ZXMP M721 devices in separate network segments to limit lateral movement if keys are compromised.

Configure firewall rules to restrict access to ZXMP M721 management interfaces.

🧯 If You Can't Patch

  • Monitor for unusual access patterns to device management interfaces and review logs for authorization bypass attempts.
  • Rotate all cryptographic keys stored on the device and implement strict access controls to limit exposure.

🔍 How to Verify

Check if Vulnerable:

Check if low-privileged users can access private key files or management interfaces beyond their permissions; test authorization controls.

Check Version:

Use device CLI command 'show version' or similar to confirm updated firmware version matches vendor patch notes.

Verify Fix Applied:

After patching, verify that low-privileged users can no longer access private keys and authorization checks are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to key storage areas
  • Log entries showing low-privileged users accessing restricted functions

Network Indicators:

  • Unusual traffic patterns from ZXMP M721 devices suggesting key compromise
  • Suspicious connections to key management ports

SIEM Query:

source="ZXMP_M721" AND (event_type="authorization_failure" OR event_type="key_access")

🔗 References

📤 Share & Export