CVE-2023-38951: n/a in n/a
ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.
AI Analysis
Technical Summary
CVE-2023-38951 is a critical vulnerability affecting ZKTeco BioTime versions 8.5.5 through 9.x prior to 9.0.1 (build 20240617.19506). The flaw exists in the handling of requests to the /base/sftpsetting/ endpoints, where authenticated attackers can exploit a path traversal vulnerability in the Username field combined with insufficient input sanitization on the SSH Key field. This allows attackers to create or overwrite arbitrary files on the server hosting the BioTime application. By overwriting specific system files, attackers may achieve arbitrary code execution with NT AUTHORITY\SYSTEM privileges, effectively gaining full control over the affected system. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and has a CVSS v3.1 base score of 9.8, indicating critical severity. The attack vector is network-based with no user interaction required and no privileges needed to initiate exploitation, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the potential impact is severe due to the ability to execute code as SYSTEM, which can lead to full system compromise, data theft, disruption of services, or lateral movement within a network. The vulnerability affects a widely used biometric time attendance and access control software, which is often deployed in enterprise environments, including those in Europe, to manage physical security and workforce attendance.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for sectors relying heavily on physical access control and workforce management systems such as manufacturing, healthcare, government, and critical infrastructure. Exploitation could lead to unauthorized access to secure facilities, manipulation or deletion of attendance records, and potential disruption of operational continuity. Given the SYSTEM-level code execution capability, attackers could deploy ransomware, steal sensitive data, or use compromised systems as footholds for further network intrusion. The risk is amplified in environments where BioTime is integrated with other enterprise systems or where patching cycles are slow. Additionally, the breach of physical security systems could have regulatory and compliance implications under GDPR and other European data protection laws, potentially resulting in legal and financial penalties.
Mitigation Recommendations
European organizations using ZKTeco BioTime should immediately verify their software version and prioritize upgrading to version 9.0.1 (build 20240617.19506) or later, where this vulnerability is addressed. In the absence of an official patch, organizations should restrict access to the /base/sftpsetting/ endpoints by implementing network segmentation and firewall rules to limit access only to trusted administrators. Employ strong authentication mechanisms and monitor logs for unusual activity related to SFTP settings or SSH key modifications. Conduct regular audits of file integrity on the server to detect unauthorized changes. Additionally, implement application-layer input validation and sanitization controls where possible to mitigate path traversal attempts. Organizations should also prepare incident response plans specifically addressing potential exploitation of this vulnerability and consider deploying endpoint detection and response (EDR) solutions to identify suspicious behavior indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2023-38951: n/a in n/a
Description
ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.
AI-Powered Analysis
Technical Analysis
CVE-2023-38951 is a critical vulnerability affecting ZKTeco BioTime versions 8.5.5 through 9.x prior to 9.0.1 (build 20240617.19506). The flaw exists in the handling of requests to the /base/sftpsetting/ endpoints, where authenticated attackers can exploit a path traversal vulnerability in the Username field combined with insufficient input sanitization on the SSH Key field. This allows attackers to create or overwrite arbitrary files on the server hosting the BioTime application. By overwriting specific system files, attackers may achieve arbitrary code execution with NT AUTHORITY\SYSTEM privileges, effectively gaining full control over the affected system. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and has a CVSS v3.1 base score of 9.8, indicating critical severity. The attack vector is network-based with no user interaction required and no privileges needed to initiate exploitation, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the potential impact is severe due to the ability to execute code as SYSTEM, which can lead to full system compromise, data theft, disruption of services, or lateral movement within a network. The vulnerability affects a widely used biometric time attendance and access control software, which is often deployed in enterprise environments, including those in Europe, to manage physical security and workforce attendance.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for sectors relying heavily on physical access control and workforce management systems such as manufacturing, healthcare, government, and critical infrastructure. Exploitation could lead to unauthorized access to secure facilities, manipulation or deletion of attendance records, and potential disruption of operational continuity. Given the SYSTEM-level code execution capability, attackers could deploy ransomware, steal sensitive data, or use compromised systems as footholds for further network intrusion. The risk is amplified in environments where BioTime is integrated with other enterprise systems or where patching cycles are slow. Additionally, the breach of physical security systems could have regulatory and compliance implications under GDPR and other European data protection laws, potentially resulting in legal and financial penalties.
Mitigation Recommendations
European organizations using ZKTeco BioTime should immediately verify their software version and prioritize upgrading to version 9.0.1 (build 20240617.19506) or later, where this vulnerability is addressed. In the absence of an official patch, organizations should restrict access to the /base/sftpsetting/ endpoints by implementing network segmentation and firewall rules to limit access only to trusted administrators. Employ strong authentication mechanisms and monitor logs for unusual activity related to SFTP settings or SSH key modifications. Conduct regular audits of file integrity on the server to detect unauthorized changes. Additionally, implement application-layer input validation and sanitization controls where possible to mitigate path traversal attempts. Organizations should also prepare incident response plans specifically addressing potential exploitation of this vulnerability and consider deploying endpoint detection and response (EDR) solutions to identify suspicious behavior indicative of exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-07-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb451
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/3/2025, 6:40:49 PM
Last updated: 8/15/2025, 6:06:11 PM
Views: 29
Related Threats
CVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.