Skip to main content

CVE-2023-38951: n/a in n/a

Critical
VulnerabilityCVE-2023-38951cvecve-2023-38951
Published: Thu Aug 03 2023 (08/03/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.

AI-Powered Analysis

AILast updated: 07/03/2025, 18:40:49 UTC

Technical Analysis

CVE-2023-38951 is a critical vulnerability affecting ZKTeco BioTime versions 8.5.5 through 9.x prior to 9.0.1 (build 20240617.19506). The flaw exists in the handling of requests to the /base/sftpsetting/ endpoints, where authenticated attackers can exploit a path traversal vulnerability in the Username field combined with insufficient input sanitization on the SSH Key field. This allows attackers to create or overwrite arbitrary files on the server hosting the BioTime application. By overwriting specific system files, attackers may achieve arbitrary code execution with NT AUTHORITY\SYSTEM privileges, effectively gaining full control over the affected system. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and has a CVSS v3.1 base score of 9.8, indicating critical severity. The attack vector is network-based with no user interaction required and no privileges needed to initiate exploitation, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the potential impact is severe due to the ability to execute code as SYSTEM, which can lead to full system compromise, data theft, disruption of services, or lateral movement within a network. The vulnerability affects a widely used biometric time attendance and access control software, which is often deployed in enterprise environments, including those in Europe, to manage physical security and workforce attendance.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for sectors relying heavily on physical access control and workforce management systems such as manufacturing, healthcare, government, and critical infrastructure. Exploitation could lead to unauthorized access to secure facilities, manipulation or deletion of attendance records, and potential disruption of operational continuity. Given the SYSTEM-level code execution capability, attackers could deploy ransomware, steal sensitive data, or use compromised systems as footholds for further network intrusion. The risk is amplified in environments where BioTime is integrated with other enterprise systems or where patching cycles are slow. Additionally, the breach of physical security systems could have regulatory and compliance implications under GDPR and other European data protection laws, potentially resulting in legal and financial penalties.

Mitigation Recommendations

European organizations using ZKTeco BioTime should immediately verify their software version and prioritize upgrading to version 9.0.1 (build 20240617.19506) or later, where this vulnerability is addressed. In the absence of an official patch, organizations should restrict access to the /base/sftpsetting/ endpoints by implementing network segmentation and firewall rules to limit access only to trusted administrators. Employ strong authentication mechanisms and monitor logs for unusual activity related to SFTP settings or SSH key modifications. Conduct regular audits of file integrity on the server to detect unauthorized changes. Additionally, implement application-layer input validation and sanitization controls where possible to mitigate path traversal attempts. Organizations should also prepare incident response plans specifically addressing potential exploitation of this vulnerability and consider deploying endpoint detection and response (EDR) solutions to identify suspicious behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-07-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb451

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/3/2025, 6:40:49 PM

Last updated: 8/15/2025, 6:06:11 PM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats