VYPR

BioTime

by Zkteco

CVEs (11)

  • CVE-2023-38950KEVAug 3, 2023
    risk 0.19cvss epss 0.83

    A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime.

  • CVE-2023-38952Aug 3, 2023
    risk 0.02cvss epss 0.19

    Insecure access control in ZKTeco BioTime through 9.0.1 allows authenticated attackers to escalate their privileges due to the fact that session ids are not validated for the type of user accessing the application by default. Privilege restrictions between non-admin and admin users are not enforced and any authenticated user can leverage admin functions without restriction by making direct requests to administrative endpoints.

  • CVE-2023-38951Aug 3, 2023
    risk 0.01cvss epss 0.18

    ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.

  • CVE-2024-13966May 27, 2025
    risk 0.00cvss epss 0.01

    ZKTeco BioTime allows unauthenticated attackers to enumerate usernames and log in as any user with a password unchanged from the default value '123456'. Users should change their passwords (located under the Attendance Settings tab as "Self-Password").

  • CVE-2024-6523Jul 5, 2024
    risk 0.00cvss epss 0.00

    A vulnerability was found in ZKTeco BioTime up to 9.5.2. It has been classified as problematic. Affected is an unknown function of the component system-group-add Handler. The manipulation of the argument user with the input leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-270366 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

  • CVE-2023-51142Mar 21, 2024
    risk 0.00cvss epss 0.00

    An issue in ZKTeco BioTime v.8.5.4 and before allows a remote attacker to obtain sensitive information.

  • CVE-2023-38949Aug 3, 2023
    risk 0.00cvss epss 0.00

    An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request.

  • CVE-2022-38802Nov 30, 2022
    risk 0.00cvss epss 0.01

    Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

  • CVE-2022-38801Nov 30, 2022
    risk 0.00cvss epss 0.00

    In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.

  • CVE-2022-38803Nov 30, 2022
    risk 0.00cvss epss 0.00

    Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

  • CVE-2022-30515Nov 8, 2022
    risk 0.00cvss epss 0.00

    ZKTeco BioTime 8.5.4 is missing authentication on folders containing employee photos, allowing an attacker to view them through filename enumeration.