Unauthenticated Access Vulnerability in ZTE Mobile Phones Allows Unauthorized Application Interface Invocation

Unauthenticated Access Vulnerability in ZTE Mobile Phones Allows Unauthorized Application Interface Invocation

CVE-2022-39074 · LOW Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission.

Learn more about our Mobile App Penetration Testing.