Home

Description

ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache Tomcat server that allow unauthenticated attackers to access the manager application. Attackers can authenticate with hardcoded credentials stored in tomcat-users.xml to upload malicious WAR archives containing JSP applications and execute arbitrary code with SYSTEM privileges.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-04-07 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Use of Hard-coded Credentials

Product status

3.0.1.0_R_230
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5362.php (Zero Science Lab Disclosure) third-party-advisory

cxsecurity.com/issue/WLB-2016080266 (CXSecurity) third-party-advisory

exchange.xforce.ibmcloud.com/vulnerabilities/116484 (IBM X-Force Exchange) vdb-entry

packetstormsecurity.com/files/138567 (Packet Storm Security) exploit

www.exploit-db.com/exploits/40324/ (Reference) exploit

www.vulncheck.com/...coded-credentials-remote-code-execution (VulnCheck Advisory: ZKTeco ZKBioSecurity 3.0 Hardcoded Credentials Remote Code Execution) third-party-advisory

cve.org (CVE-2016-20026)

nvd.nist.gov (CVE-2016-20026)

Download JSON