CVE-2024-2318: Path Traversal: '../filedir' in ZKTeco ZKBio Media
A vulnerability was found in ZKTeco ZKBio Media 2.0.0_x64_2024-01-29-1028. It has been classified as problematic. Affected is an unknown function of the file /pro/common/download of the component Service Port 9999. The manipulation of the argument fileName with the input ../../../../zkbio_media.sql leads to path traversal: '../filedir'. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.3 Build 2025-05-26-1605 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2024-2318 is a path traversal vulnerability identified in ZKTeco's ZKBio Media software version 2.0.0_x64_2024-01-29-1028. The vulnerability exists in an unspecified function handling requests to the /pro/common/download endpoint on Service Port 9999. Specifically, the issue arises from improper sanitization of the 'fileName' parameter, which allows an attacker to manipulate the input with directory traversal sequences such as '../../../../zkbio_media.sql'. This manipulation enables unauthorized access to files outside the intended directory scope, potentially exposing sensitive files on the server. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality. Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the likelihood of exploitation. The vendor has addressed this vulnerability in version 2.1.3 Build 2025-05-26-1605, and upgrading to this version is recommended to mitigate the risk. The vulnerability primarily affects the Service Port 9999 component of ZKBio Media, a software product used for biometric and security management, commonly deployed in physical access control systems.
Potential Impact
For European organizations using ZKTeco ZKBio Media, this vulnerability poses a significant risk of unauthorized data exposure. Attackers exploiting the path traversal flaw could access configuration files, database files, or other sensitive information stored on the server hosting the application. This could lead to leakage of biometric data, user credentials, or system configuration details, undermining the confidentiality and integrity of security systems. Given that ZKBio Media is often integrated into physical security infrastructures, exploitation could facilitate further attacks such as unauthorized physical access or lateral movement within networks. The remote and unauthenticated nature of the exploit increases the threat surface, especially for organizations with internet-facing instances of ZKBio Media or insufficient network segmentation. The medium severity rating indicates moderate impact, but the sensitivity of biometric and access control data elevates the potential consequences. European organizations in sectors such as government, critical infrastructure, transportation, and corporate facilities management are particularly at risk due to their reliance on biometric security solutions and regulatory requirements for data protection under GDPR.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading ZKTeco ZKBio Media to version 2.1.3 Build 2025-05-26-1605 or later, where the issue is resolved. In addition to patching, organizations should implement network-level controls such as restricting access to Service Port 9999 to trusted internal networks or VPNs, thereby reducing exposure to external attackers. Employing web application firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Regularly auditing and monitoring logs for suspicious access patterns targeting the /pro/common/download endpoint can help detect exploitation attempts early. Organizations should also review file system permissions to ensure that the application runs with the least privilege necessary, limiting the scope of accessible files even if traversal occurs. Finally, conducting security awareness training for IT staff on timely patch management and vulnerability response will improve overall resilience against such threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
CVE-2024-2318: Path Traversal: '../filedir' in ZKTeco ZKBio Media
Description
A vulnerability was found in ZKTeco ZKBio Media 2.0.0_x64_2024-01-29-1028. It has been classified as problematic. Affected is an unknown function of the file /pro/common/download of the component Service Port 9999. The manipulation of the argument fileName with the input ../../../../zkbio_media.sql leads to path traversal: '../filedir'. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.3 Build 2025-05-26-1605 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2024-2318 is a path traversal vulnerability identified in ZKTeco's ZKBio Media software version 2.0.0_x64_2024-01-29-1028. The vulnerability exists in an unspecified function handling requests to the /pro/common/download endpoint on Service Port 9999. Specifically, the issue arises from improper sanitization of the 'fileName' parameter, which allows an attacker to manipulate the input with directory traversal sequences such as '../../../../zkbio_media.sql'. This manipulation enables unauthorized access to files outside the intended directory scope, potentially exposing sensitive files on the server. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality. Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the likelihood of exploitation. The vendor has addressed this vulnerability in version 2.1.3 Build 2025-05-26-1605, and upgrading to this version is recommended to mitigate the risk. The vulnerability primarily affects the Service Port 9999 component of ZKBio Media, a software product used for biometric and security management, commonly deployed in physical access control systems.
Potential Impact
For European organizations using ZKTeco ZKBio Media, this vulnerability poses a significant risk of unauthorized data exposure. Attackers exploiting the path traversal flaw could access configuration files, database files, or other sensitive information stored on the server hosting the application. This could lead to leakage of biometric data, user credentials, or system configuration details, undermining the confidentiality and integrity of security systems. Given that ZKBio Media is often integrated into physical security infrastructures, exploitation could facilitate further attacks such as unauthorized physical access or lateral movement within networks. The remote and unauthenticated nature of the exploit increases the threat surface, especially for organizations with internet-facing instances of ZKBio Media or insufficient network segmentation. The medium severity rating indicates moderate impact, but the sensitivity of biometric and access control data elevates the potential consequences. European organizations in sectors such as government, critical infrastructure, transportation, and corporate facilities management are particularly at risk due to their reliance on biometric security solutions and regulatory requirements for data protection under GDPR.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading ZKTeco ZKBio Media to version 2.1.3 Build 2025-05-26-1605 or later, where the issue is resolved. In addition to patching, organizations should implement network-level controls such as restricting access to Service Port 9999 to trusted internal networks or VPNs, thereby reducing exposure to external attackers. Employing web application firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Regularly auditing and monitoring logs for suspicious access patterns targeting the /pro/common/download endpoint can help detect exploitation attempts early. Organizations should also review file system permissions to ensure that the application runs with the least privilege necessary, limiting the scope of accessible files even if traversal occurs. Finally, conducting security awareness training for IT staff on timely patch management and vulnerability response will improve overall resilience against such threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-03-08T06:48:01.928Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68487f591b0bd07c3938aae4
Added to database: 6/10/2025, 6:54:17 PM
Last enriched: 7/11/2025, 12:16:42 AM
Last updated: 8/11/2025, 9:55:42 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.