First published: Tue Aug 29 2017(Updated: )
ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zte Ox-330p Firmware | ||
ZTE OX-330P | ||
Zte Zxhn H108n Firmware | ||
ZTE ZXHN H108N | ||
Zte W300v1.0.0s Zrd Tr1 D68 Firmware | ||
Zte W300v1.0.0s Zrd Tr1 D68 | ||
Zte Hg110 Firmware | ||
Zte Hg110 | ||
Zte Gan9.8t101a-b Firmware | ||
Zte Gan9.8t101a-b | ||
Zte Mf28g Firmware | ||
Zte Mf28g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7255 has a moderate severity rating due to the potential for man-in-the-middle attacks.
To fix CVE-2015-7255, ensure that unique X.509 certificates and SSH host keys are used for each device.
CVE-2015-7255 affects ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, and MF28G.
The potential risks of CVE-2015-7255 include remote attackers obtaining sensitive information through man-in-the-middle or passive decryption attacks.
Yes, CVE-2015-7255 can be exploited remotely if the device is configured with non-unique cryptographic elements.