CVE-2021-47740
Session Management Flaw in KZTech JT3500V Enables Unauthorized Access
Publication date: 2025-12-31
Last updated on: 2025-12-31
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kztech | am5000w | 2.0.0b3037 |
| kztech | am3100v | 2.0.0b946 |
| kztech | kz3120r | 2.0.0b01 |
| kztech | am3100e | 2.0.0b981 |
| kztech | kz7621u | 2.0.0b14 |
| kztech | am3000m | 2.0.0b21 |
| kztech | am4200m | 2.0.0b2996 |
| kztech | am3500mw | 2.0.0b1092 |
| kztech | am3410v | 2.0.0b1085 |
| kztech | am4100v | 2.0.0b2988 |
| kztech | kz3220m | 2.0.0b04 |
| kztech | am3300v | 2.0.0b1060 |
| kztech | jt3500v | 2.0.1b1064 |
| kztech | jt3500v | 2.0.1 |
| kztech | am6200m | 2.0.0b3210 |
| kztech | am6000n | 2.0.0b3042 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects KZTech JT3500V 4G LTE CPE and related models, where the devices have insufficient session expiration in their web application interface. Attackers can reuse old session credentials or session IDs because the sessions do not expire properly. This allows unauthorized users to bypass security controls and maintain access to the device by hijacking or reusing legitimate user sessions. [3, 5]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to the affected devices by allowing attackers to reuse old session credentials. This can compromise device authentication mechanisms and potentially enable persistent unauthorized control over the device, exposing the network and connected systems to security risks. [3, 5]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing whether old session credentials or session IDs can still be used to access the device without expiration. A practical approach is to capture session tokens during normal authentication and then attempt to reuse these tokens after logout or session timeout to see if access is still granted. Specific commands are not provided in the resources, but using tools like curl or browser developer tools to capture and replay session cookies or tokens against the device's web interface can help verify the vulnerability. [3, 5]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the device firmware to a version that properly handles session expiration and prevents reuse of old session credentials. If a firmware update is not available, implementing additional session management controls such as forcing logout on session expiration, disabling persistent sessions, or restricting access to trusted networks can help reduce risk. [5]