CVE-2025-15128

5.3 MEDIUM

📋 TL;DR

This vulnerability in ZKTeco BioTime allows attackers to remotely access and manipulate credential storage parameters, leading to unprotected storage of sensitive credentials. It affects BioTime versions up to 9.0.3, 9.0.4, and 9.5.2. Organizations using these versions for biometric time and attendance systems are at risk.

💻 Affected Systems

Products:
  • ZKTeco BioTime
Versions: up to 9.0.3, 9.0.4, 9.5.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /base/safe_setting/ endpoint component; remote exploitation is possible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to stored credentials, potentially compromising the entire biometric system and enabling further attacks on connected systems.

🟠

Likely Case

Credential theft leading to unauthorized access to the BioTime system, manipulation of attendance records, or data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent remote exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public proof-of-concept available on GitHub; vendor was contacted but did not respond.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available; monitor vendor for updates and apply immediately when released.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to BioTime systems to internal networks only; block external access to the vulnerable endpoint.

Access Control Lists

all

Implement strict ACLs to limit which IP addresses can access the /base/safe_setting/ endpoint.

🧯 If You Can't Patch

  • Isolate BioTime systems on a dedicated VLAN with strict firewall rules.
  • Implement multi-factor authentication and monitor for unusual access patterns to the system.

🔍 How to Verify

Check if Vulnerable:

Check BioTime version via the web interface or configuration files; versions up to 9.0.3, 9.0.4, or 9.5.2 are vulnerable.

Check Version:

Check the web interface or configuration files for version information.

Verify Fix Applied:

Verify by updating to a patched version when available and testing the endpoint for credential exposure.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /base/safe_setting/ endpoint
  • Failed authentication attempts followed by credential access

Network Indicators:

  • HTTP requests to /base/safe_setting/ with parameter manipulation

SIEM Query:

source_ip:* AND uri_path:"/base/safe_setting/" AND (param:"backup_encryption_password_decrypt" OR param:"export_encryption_password_decrypt")

🔗 References

📤 Share & Export