Description
There is a local privilege escalation vulnerability in the ZTE PROCESS Guard service of the cloud computer client, which may allow local arbitrary code execution, privilege escalation and path traversal bypass.
Published: 2026-05-06
Score: 5.2 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A local privilege escalation flaw exists in the ZTE PROCESS Guard service that allows a local attacker to execute arbitrary code with elevated privileges and bypass path traversal checks. This weakness can be exploited by any user with local access to the device, providing the attacker the ability to run code at higher privilege levels, modify system files, or otherwise take full control of the affected system.

Affected Systems

The vulnerability impacts the ZTE PROCESS Guard service component of the cloud computer client. No specific version numbers are listed in the CNA data, so all current installations of this service are potentially affected until a patch is applied.

Risk and Exploitability

The CVSS score of 5.2 indicates moderate severity. No EPSS or KEV information is available, suggesting that widespread exploitation data is not documented. The likely attack vector is local: an attacker must have physical or local user access to the system to trigger the flaw. Once executed, the attacker can gain elevated rights and potentially compromise the host.

Generated by OpenCVE AI on May 6, 2026 at 11:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the ZTE support portal for an updated version of the PROCESS Guard service and install the latest patch promptly
  • Restrict access to the PROCESS Guard service by limiting it to trusted users or administrative accounts
  • If the service is not required for business operations, disable or uninstall it to eliminate the attack surface

Generated by OpenCVE AI on May 6, 2026 at 11:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description There is a local privilege escalation vulnerability in the ZTE PROCESS Guard service of the cloud computer client, which may allow local arbitrary code execution, privilege escalation and path traversal bypass.
Title Local privilege escalation vulnerability in ZTE PROCESS Guard service of the cloud computer client
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: zte

Published:

Updated: 2026-05-06T08:48:10.466Z

Reserved: 2026-04-08T07:51:26.675Z

Link: CVE-2026-40001

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T10:16:19.950

Modified: 2026-05-06T10:16:19.950

Link: CVE-2026-40001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T11:30:26Z

Weaknesses