Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

5/14/2018
11:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Trump Tweets Lifeline to ZTE

After running afoul of the US Commerce Department and raising security concerns, ZTE appears to get a lifeline from President Trump.

President Donald Trump seemed to throw a lifeline to ZTE on Sunday in the form of a tweet, writing that he would work with the president of China to help rescue the company following crippling sanctions issued by the US Commerce Department.

Last week, the Commerce Department issued a ban against US companies selling components to ZTE, which is one of the world's largest makers of handsets. The company also sells networking equipment outside of the US.

The sanctions appeared to put ZTE out of business.

Then, on May 13, Trump tweeted he planned to work with President Xi Jinping to help ZTE return to normal operations.

ZTE has been on a rollercoaster the last several weeks when it comes to the US market and officials.

Earlier this month, the Pentagon banned Huawei and ZTE from selling smartphones to Defense Department personnel, citing national security concerns. (See Pentagon, Citing Security, Will Stop Selling Huawei, ZTE Smartphones.)

Before the Pentagon announcement, the chairman of the Federal Communications Commission said the agency would deny federal contracts and other funds to companies that posed a national security threat. Although not named, the ban is expected to target Huawei, ZTE, as well as Russia's Kasperksy Labs.

For additional details about the ups and downs for ZTE and the US government, check out the expanded coverage on Light Reading.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20925
PUBLISHED: 2020-11-24
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions...
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.