CVE-2023-4587

8.3 HIGH

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in ZKTeco ZEM800 version 6.60 allows local attackers to access sensitive backup and configuration files without proper authorization. This affects organizations using the vulnerable ZEM800 product on their local networks or VPN connections. Attackers can potentially obtain user data and device configurations.

💻 Affected Systems

Products:
  • ZKTeco ZEM800
Versions: Version 6.60
Operating Systems: Embedded system (specific OS unknown)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices accessible via local network or VPN. Physical access not required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain complete user databases and device configurations, enabling identity theft, credential harvesting, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive user backup files containing personal information and device configurations that could be used for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized local network access.

🌐 Internet-Facing: LOW - Requires local network or VPN access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Exploitable by any local network user or VPN-connected user without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

IDOR vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-zkteco-zem800

Restart Required: No

Instructions:

Check vendor website for security updates. No specific patch instructions available at this time.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ZEM800 devices on separate VLANs with strict access controls

Access Control Lists

all

Implement firewall rules to restrict access to ZEM800 devices to authorized users only

🧯 If You Can't Patch

  • Segment ZEM800 devices on isolated network segments with strict access controls
  • Monitor network traffic to ZEM800 devices for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or console. If version is 6.60, device is vulnerable.

Check Version:

Check device web interface or console for version information (specific command unknown)

Verify Fix Applied:

Verify device has been updated to a version later than 6.60 or has been properly segmented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to backup or configuration endpoints
  • Multiple failed access attempts followed by successful file downloads

Network Indicators:

  • Unusual HTTP requests to backup/configuration file endpoints from unauthorized IPs
  • Large data transfers from ZEM800 devices

SIEM Query:

source_ip IN (unauthorized_ips) AND dest_ip = (zem800_ip) AND (url CONTAINS 'backup' OR url CONTAINS 'config')

🔗 References

📤 Share & Export