CVE-2025-15128: Unprotected Storage of Credentials in ZKTeco BioTime
A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15128 is a vulnerability identified in the ZKTeco BioTime biometric attendance and access control software, affecting versions 9.0.0 through 9.5.2. The issue lies within the /base/safe_setting/ directory of the endpoint component, specifically involving the manipulation of the parameters backup_encryption_password_decrypt and export_encryption_password_decrypt. These parameters control the encryption and decryption of backup passwords, but due to improper handling, credentials are stored unprotected, exposing them to unauthorized retrieval. The vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers with network access to the device. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Despite the medium severity rating, the presence of a public exploit increases the risk of exploitation in the wild. The vendor has not responded or issued patches, leaving organizations reliant on mitigation strategies. The exposure of credentials could allow attackers to gain unauthorized access to the BioTime system, potentially manipulating attendance records or bypassing physical access controls. The vulnerability highlights a critical failure in secure credential storage and encryption practices within the affected software versions.
Potential Impact
For European organizations, the impact of CVE-2025-15128 can be significant, particularly for those relying on ZKTeco BioTime for workforce attendance tracking and physical access control. Unauthorized access to stored credentials could enable attackers to impersonate legitimate users, manipulate attendance data, or gain physical entry to restricted areas, undermining operational security and compliance with data protection regulations such as GDPR. The breach of biometric system credentials may also lead to broader network compromise if these credentials are reused or linked to other systems. Industries with stringent security requirements, including government agencies, healthcare, finance, and critical infrastructure, are especially vulnerable. Additionally, the lack of vendor response and patches increases the window of exposure, raising the likelihood of exploitation attempts. The public availability of an exploit further escalates the threat, potentially leading to targeted attacks or widespread scanning and exploitation campaigns across Europe.
Mitigation Recommendations
1. Immediately isolate ZKTeco BioTime devices from untrusted networks and restrict access to trusted administrators only, using network segmentation and firewall rules. 2. Monitor network traffic to and from BioTime endpoints for unusual activity, especially attempts to manipulate backup_encryption_password_decrypt or export_encryption_password_decrypt parameters. 3. Implement strict access controls and multi-factor authentication on management interfaces to reduce the risk of unauthorized access. 4. Regularly audit and review credential storage practices and consider deploying additional encryption layers or hardware security modules (HSMs) to protect sensitive data. 5. Maintain up-to-date backups of configuration and attendance data to enable recovery in case of compromise. 6. Engage with ZKTeco for updates or patches and subscribe to vulnerability advisories for timely information. 7. Consider temporary replacement or supplementation of BioTime with alternative attendance or access control solutions until a secure version is available. 8. Educate staff on the risks and signs of exploitation attempts to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-15128: Unprotected Storage of Credentials in ZKTeco BioTime
Description
A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15128 is a vulnerability identified in the ZKTeco BioTime biometric attendance and access control software, affecting versions 9.0.0 through 9.5.2. The issue lies within the /base/safe_setting/ directory of the endpoint component, specifically involving the manipulation of the parameters backup_encryption_password_decrypt and export_encryption_password_decrypt. These parameters control the encryption and decryption of backup passwords, but due to improper handling, credentials are stored unprotected, exposing them to unauthorized retrieval. The vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers with network access to the device. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. Despite the medium severity rating, the presence of a public exploit increases the risk of exploitation in the wild. The vendor has not responded or issued patches, leaving organizations reliant on mitigation strategies. The exposure of credentials could allow attackers to gain unauthorized access to the BioTime system, potentially manipulating attendance records or bypassing physical access controls. The vulnerability highlights a critical failure in secure credential storage and encryption practices within the affected software versions.
Potential Impact
For European organizations, the impact of CVE-2025-15128 can be significant, particularly for those relying on ZKTeco BioTime for workforce attendance tracking and physical access control. Unauthorized access to stored credentials could enable attackers to impersonate legitimate users, manipulate attendance data, or gain physical entry to restricted areas, undermining operational security and compliance with data protection regulations such as GDPR. The breach of biometric system credentials may also lead to broader network compromise if these credentials are reused or linked to other systems. Industries with stringent security requirements, including government agencies, healthcare, finance, and critical infrastructure, are especially vulnerable. Additionally, the lack of vendor response and patches increases the window of exposure, raising the likelihood of exploitation attempts. The public availability of an exploit further escalates the threat, potentially leading to targeted attacks or widespread scanning and exploitation campaigns across Europe.
Mitigation Recommendations
1. Immediately isolate ZKTeco BioTime devices from untrusted networks and restrict access to trusted administrators only, using network segmentation and firewall rules. 2. Monitor network traffic to and from BioTime endpoints for unusual activity, especially attempts to manipulate backup_encryption_password_decrypt or export_encryption_password_decrypt parameters. 3. Implement strict access controls and multi-factor authentication on management interfaces to reduce the risk of unauthorized access. 4. Regularly audit and review credential storage practices and consider deploying additional encryption layers or hardware security modules (HSMs) to protect sensitive data. 5. Maintain up-to-date backups of configuration and attendance data to enable recovery in case of compromise. 6. Engage with ZKTeco for updates or patches and subscribe to vulnerability advisories for timely information. 7. Consider temporary replacement or supplementation of BioTime with alternative attendance or access control solutions until a secure version is available. 8. Educate staff on the risks and signs of exploitation attempts to enhance detection and response capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T09:08:42.325Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bbdb813ff03e2bf842
Added to database: 12/30/2025, 10:22:51 PM
Last enriched: 12/30/2025, 11:43:56 PM
Last updated: 2/7/2026, 8:46:44 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.