There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: zte

Published: 2023-05-30T00:00:00

Updated: 2023-05-30T00:00:00

Reserved: 2022-08-31T00:00:00


Link: CVE-2022-39071

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-05-30T23:15:09.273

Modified: 2023-06-07T14:40:35.163


Link: CVE-2022-39071

JSON object: View

cve-icon Redhat Information

No data.