Search criteria

2 vulnerabilities found for zxone_8700_firmware by zte

CVE-2021-21726 (GCVE-0-2021-21726)

Vulnerability from nvd – Published: 2021-03-12 18:05 – Updated: 2024-08-03 18:23
VLAI?
Summary
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:<ZXONE 9700 , ZXONE 8700, ZXONE 19700><V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Severity ?
No CVSS data available.
CWE
  • input verification
Assigner
zte
References
Impacted products
Vendor Product Version
n/a <ZXONE 9700 , ZXONE 8700, ZXONE 19700> Affected: <V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:23:28.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "input verification",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-12T18:05:34.000Z",
        "orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
        "shortName": "zte"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@zte.com.cn",
          "ID": "CVE-2021-21726",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "input verification"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664",
              "refsource": "MISC",
              "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
    "assignerShortName": "zte",
    "cveId": "CVE-2021-21726",
    "datePublished": "2021-03-12T18:05:34.000Z",
    "dateReserved": "2021-01-04T00:00:00.000Z",
    "dateUpdated": "2024-08-03T18:23:28.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-21726 (GCVE-0-2021-21726)

Vulnerability from cvelistv5 – Published: 2021-03-12 18:05 – Updated: 2024-08-03 18:23
VLAI?
Summary
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:<ZXONE 9700 , ZXONE 8700, ZXONE 19700><V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Severity ?
No CVSS data available.
CWE
  • input verification
Assigner
zte
References
Impacted products
Vendor Product Version
n/a <ZXONE 9700 , ZXONE 8700, ZXONE 19700> Affected: <V1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set>
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:23:28.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "input verification",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-12T18:05:34.000Z",
        "orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
        "shortName": "zte"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@zte.com.cn",
          "ID": "CVE-2021-21726",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illegal parameters. This affects:\u003cZXONE 9700 , ZXONE 8700, ZXONE 19700\u003e\u003cV1.40.021.021CP049, V1.0P02B219_@NCPM-RELEASE_2.40R1-20200914.set\u003e"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "input verification"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664",
              "refsource": "MISC",
              "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014664"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
    "assignerShortName": "zte",
    "cveId": "CVE-2021-21726",
    "datePublished": "2021-03-12T18:05:34.000Z",
    "dateReserved": "2021-01-04T00:00:00.000Z",
    "dateUpdated": "2024-08-03T18:23:28.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}