Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:zxhn_f677_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D03235A8-CFEF-48EF-9145-E7143D590C89", "versionEndExcluding": "9.0.0p1n29", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:zxhn_f677:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA655598-7EF3-487A-A21A-9943BF0A8F8B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:zte:zxhn_f477_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EF1A605-BB28-4FB8-9B6B-85CD466BEB2A", "versionEndExcluding": "9.0.0p1n29", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zte:zxhn_f477:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A946EEE-D344-4879-AC74-120AEABC5A89", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "There is a directory traversal vulnerability in some home gateway products of ZTE. Due to the lack of verification of user modified destination path, an attacker with specific permissions could modify the FTP access path to access and modify the system path contents without authorization, which will cause information leak and affect device operation."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de salto de directorio en algunos productos de puerta de enlace dom\u00e9stica de ZTE. Debido a una falta de verificaci\u00f3n de la ruta de destino modificada por el usuario, un atacante con permisos espec\u00edficos podr\u00eda modificar la ruta de acceso FTP para acceder y modificar el contenido de la ruta del sistema sin autorizaci\u00f3n, lo que causar\u00eda un filtrado de informaci\u00f3n y afectar\u00eda al funcionamiento del dispositivo"}], "id": "CVE-2022-23135", "lastModified": "2024-11-21T06:48:04.507", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-02-24T19:15:10.183", "references": [{"source": "psirt@zte.com.cn", "tags": ["Vendor Advisory"], "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1023444"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1023444"}], "sourceIdentifier": "psirt@zte.com.cn", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}