Home

Description

A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2025-12-27 | Published 2025-12-28 | Updated 2025-12-29 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR

Problem types

Unprotected Storage of Credentials

Credentials Management

Product status

9.0.0
affected

9.0.1
affected

9.0.2
affected

9.0.3
affected

9.0.4
affected

9.5.0
affected

9.5.1
affected

9.5.2
affected

Timeline

2025-12-27:Advisory disclosed
2025-12-27:VulDB entry created
2025-12-27:VulDB entry last update

Credits

luca_irinel (VulDB User) reporter

References

vuldb.com/?id.338506 (VDB-338506 | ZKTeco BioTime Endpoint safe_setting credentials storage) vdb-entry technical-description

vuldb.com/?ctiid.338506 (VDB-338506 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.711813 (Submit #711813 | ZkBioTime CMS 9.0.3, 9.0.4, 9.5.2 IDOR) third-party-advisory

github.com/ionutluca888/IDOR-POC-ZKBio-Time/tree/main exploit

cve.org (CVE-2025-15128)

nvd.nist.gov (CVE-2025-15128)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.