Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2023-42711 | ZKTeco BioTime version 8.5.5 through 9.0.1 allows authenticated attackers to create or overwrite arbitrary files on the server by making specially crafted requests to '/base/sftpsetting/' endpoints that abuse a path traversal issue in the 'Username' field and a lack of input sanitization on the 'SSH Key' field. Overwriting specific files may lead to arbitrary code execution as the 'NT AUTHORITY\SYSTEM' user. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Sat, 24 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | ZKTeco BioTime version 8.5.5 through 9.0.1 allows authenticated attackers to create or overwrite arbitrary files on the server by making specially crafted requests to '/base/sftpsetting/' endpoints that abuse a path traversal issue in the 'Username' field and a lack of input sanitization on the 'SSH Key' field. Overwriting specific files may lead to arbitrary code execution as the 'NT AUTHORITY\SYSTEM' user. | ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM. | 
| References |  | 
Mon, 19 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A path traversal vulnerability in ZKTeco BioTime v8.5.5 allows attackers to write arbitrary files via using a malicious SFTP configuration. | ZKTeco BioTime version 8.5.5 through 9.0.1 allows authenticated attackers to create or overwrite arbitrary files on the server by making specially crafted requests to '/base/sftpsetting/' endpoints that abuse a path traversal issue in the 'Username' field and a lack of input sanitization on the 'SSH Key' field. Overwriting specific files may lead to arbitrary code execution as the 'NT AUTHORITY\SYSTEM' user. | 
| References |  | 
Mon, 05 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | ssvc 
 | ssvc 
 | 
Thu, 17 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-27T19:16:38.829Z
Reserved: 2023-07-25T00:00:00.000Z
Link: CVE-2023-38951
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T17:54:39.698Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-08-03T23:15:11.363
Modified: 2025-05-27T20:15:23.647
Link: CVE-2023-38951
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.