Description
There exists an openssl.cnf privilege escalation vulnerability in ZTE Cloud PC client uSmartview. An attacker can execute arbitrary code locally and escalate privileges.
Published: 2026-05-07
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the openssl.cnf configuration file used by the ZTE Cloud PC client uSmartview permits an attacker to run arbitrary code on the host with elevated privileges. The vulnerability is a classic example of the "unspecified binary location" weakness documented as CWE-427, where improper handling of dynamic library search paths can lead to exploitation. When triggered, the attacker can gain full control of the client’s operating system on the affected machine. The description confirms that the impact is local, requiring the attacker to already have some foothold on the target system.

Affected Systems

The affected products are ZTE’s Cloud PC Client "uSmartview" as part of the ZXCLOUD iRAI suite. No specific version information is provided in the data, so any installation that relies on the openssl.cnf configuration file and has not applied a vendor patch remains at risk.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, with the primary risk being privilege escalation rather than remote exploitation. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting there is no known widespread exploitation activity yet. The attack vector is inferred to be local; an adversary must already be on the machine or have the ability to write to configuration files in order to trigger the exploit. Because the flaw arises from an improper configuration, it can be mitigated by disabling or tampering with the openssl.cnf file or by ensuring the application runs with the least privilege necessary.

Generated by OpenCVE AI on May 7, 2026 at 05:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact ZTE support to obtain an official patch or update that corrects the openssl.cnf handling.
  • Restrict file system permissions on openssl.cnf so that only the intended application user can modify it, preventing unauthorized changes that could enable the exploit.
  • Run the uSmartview client with the minimum required privileges and avoid granting it administrative rights on the system.
  • Monitor system logs for anomalous execution of commands or unexpected changes to configuration files, and respond to any detected attempts promptly.

Generated by OpenCVE AI on May 7, 2026 at 05:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 05:45:00 +0000

Type Values Removed Values Added
First Time appeared Zte
Zte zxcloud Irai
Vendors & Products Zte
Zte zxcloud Irai

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description There exists an openssl.cnf privilege escalation vulnerability in ZTE Cloud PC client uSmartview. An attacker can execute arbitrary code locally and escalate privileges.
Title openssl.cnf Privilege Escalation Vulnerability in ZTE Cloud PC Client uSmartview
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

Zte Zxcloud Irai
cve-icon MITRE

Status: PUBLISHED

Assigner: zte

Published:

Updated: 2026-05-07T12:41:25.248Z

Reserved: 2026-04-08T07:51:26.675Z

Link: CVE-2026-40004

cve-icon Vulnrichment

Updated: 2026-05-07T12:41:17.934Z

cve-icon NVD

Status : Received

Published: 2026-05-07T04:16:23.073

Modified: 2026-05-07T04:16:23.073

Link: CVE-2026-40004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T05:30:22Z

Weaknesses