Description
ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources.
Published: 2026-03-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidential data exposure by arbitrary file read
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a file path manipulation flaw in ZKTeco ZKBioSecurity 3.0. The application does not properly validate path parameters used to retrieve local resources, enabling an attacker to craft requests that point to arbitrary files on the system. By exploiting this flaw, an attacker can read sensitive files such as configuration files, source code, and other protected application resources. This leads to potential disclosure of credentials, configuration details, and other confidential data, thereby compromising the confidentiality of the system.

Affected Systems

The flaw affects ZKTeco Inc. ZKBioSecurity 3.0. The affected version is 3.0; no narrower sub‑version information is available from the CNA. Any deployment of this product without a patch may be vulnerable.

Risk and Exploitability

The CVSS score of 6.9 classifies this issue as moderate severity. The EPSS score is less than 1%, indicating a low likelihood of exploitation in the wild, and it is not listed in the CISA KEV catalog. The most probable attack vector is remote; the flaw can be triggered by sending crafted URL parameters to the device's web interface from an external network. Successful exploitation requires network connectivity to the administration interface, but no authentication is needed to read the protected files, making the vulnerability highly dangerous if exposed to untrusted networks.

Generated by OpenCVE AI on March 21, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade or apply vendor-published patch for ZKTeco ZKBioSecurity 3.0.
  • If a patch is not available, restrict the administration interface to trusted internal IP addresses and block all other inbound traffic.
  • Apply file permission restrictions to essential configuration files so only privileged processes can read them.
  • Enable detailed logging for file access on the device and regularly review logs for suspicious activity.
  • Follow the vendor's secure configuration guidelines and verify that path validation logic is correctly implemented.

Generated by OpenCVE AI on March 21, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Zkteco
Zkteco zkbiosecurity
Vendors & Products Zkteco
Zkteco zkbiosecurity

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources.
Title ZKTeco ZKBioSecurity 3.0 File Path Manipulation Vulnerability
Weaknesses CWE-276
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Zkteco Zkbiosecurity
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:20.265Z

Reserved: 2026-03-15T12:37:00.981Z

Link: CVE-2016-20029

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:48.216Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:17:49.527

Modified: 2026-04-15T14:56:45.970

Link: CVE-2016-20029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:47Z

Weaknesses