CVE-2016-20028
Description
ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious websites. Attackers can craft HTTP requests that add superadmin accounts without validity checks, enabling unauthorized administrative access when authenticated users visit attacker-controlled pages.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ZKTeco ZKBioSecurity 3.0 is vulnerable to CSRF, allowing attackers to add superadmin accounts by tricking authenticated users into visiting malicious pages.
Vulnerability
Overview
ZKTeco ZKBioSecurity 3.0, a web-based security platform integrating access control, video, elevator, and visitor management, is affected by a cross-site request forgery (CSRF) vulnerability [1][2][3][4]. The application fails to perform any validity checks on HTTP requests, allowing attackers to craft requests that add new superadmin accounts without authentication or authorization checks [1][2].
Exploitation
An attacker can exploit this by hosting a malicious web page containing a hidden form that submits to the application's authUserAction!edit.action endpoint [2][3]. When a logged-in administrator visits the attacker's page, the form is automatically submitted, creating a new superadmin account with attacker-controlled credentials [2][3]. No additional authentication is required beyond the victim's active session.
Impact
Successful exploitation grants the attacker full administrative privileges over the ZKBioSecurity system [1][4]. This includes the ability to manage users, access control settings, video surveillance, elevator controls, and visitor records, potentially compromising physical security and sensitive data [2][3].
Mitigation
As of the latest known information, ZKTeco has not released a patch for this vulnerability [4]. Users are advised to implement CSRF tokens or other anti-CSRF mechanisms, restrict access to the application, and monitor for unauthorized account creation. The vulnerability affects versions up to 3.0.1.0_R_230 [2][3][4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- cxsecurity.com/issue/WLB-2016080268nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/116477nvd
- packetstormsecurity.com/files/138569nvd
- www.exploit-db.com/exploits/40325/nvd
- www.vulncheck.com/advisories/zkteco-zkbiosecurity-cross-site-request-forgery-superadminnvd
- www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5364.phpnvd
News mentions
0No linked articles in our index yet.