Impact
A local privilege escalation flaw exists in the ZTE PROCESS Guard service that allows a local attacker to execute arbitrary code with elevated privileges and bypass path traversal checks. This weakness can be exploited by any user with local access to the device, providing the attacker the ability to run code at higher privilege levels, modify system files, or otherwise take full control of the affected system.
Affected Systems
The vulnerability impacts the ZTE PROCESS Guard service component of the cloud computer client. No specific version numbers are listed in the CNA data, so all current installations of this service are potentially affected until a patch is applied.
Risk and Exploitability
The CVSS score of 5.2 indicates moderate severity. No EPSS or KEV information is available, suggesting that widespread exploitation data is not documented. The likely attack vector is local: an attacker must have physical or local user access to the system to trigger the flaw. Once executed, the attacker can gain elevated rights and potentially compromise the host.
OpenCVE Enrichment