EUVD-2016-10809

| CVE-2016-20027 MEDIUM
2026-03-15 VulnCheck
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
EUVD ID Assigned
Mar 15, 2026 - 14:00 euvd
EUVD-2016-10809
Analysis Generated
Mar 15, 2026 - 14:00 vuln.today
CVE Published
Mar 15, 2026 - 13:35 nvd
MEDIUM 6.1

Description

ZKTeco ZKBioSecurity 3.0 contains multiple reflected cross-site scripting vulnerabilities that allow attackers to execute arbitrary HTML and script code by injecting malicious payloads through unsanitized parameters in multiple scripts. Attackers can craft malicious URLs with XSS payloads in vulnerable parameters to execute scripts in a user's browser session within the context of the affected application.

Analysis

Reflected cross-site scripting (XSS) vulnerability in ZKTeco ZKBioSecurity 3.0 that allows unauthenticated attackers to execute arbitrary HTML and JavaScript code in a victim's browser session through malicious URLs containing unsanitized parameters. The vulnerability affects all versions of ZKBioSecurity 3.0 across the product line, and publicly available exploits exist (confirmed via PacketStorm Security), making it a moderate-risk vulnerability (CVSS 6.1) with demonstrated real-world exploitation potential.

Technical Context

The vulnerability stems from a CWE-79 (Improper Neutralization of Input During Web Page Generation) root cause across multiple script endpoints in the ZKTeco ZKBioSecurity application. The affected product (cpe:2.3:a:zkteco_inc.:zkteco_zkbiosecurity:*:*:*:*:*:*:*:*) uses web-based interfaces for biometric security management but fails to properly sanitize or encode user-supplied input parameters before reflecting them into HTML responses. This allows attackers to inject arbitrary script payloads that execute in the context of the authenticated user's session, bypassing the application's intended security boundaries. The vulnerability affects multiple script entry points, suggesting systemic input validation failures rather than isolated issues.

Affected Products

ZKTeco ZKBioSecurity 3.0 (all patch levels prior to remediation). The CPE cpe:2.3:a:zkteco_inc.:zkteco_zkbiosecurity:*:*:*:*:*:*:*:* indicates the vulnerability affects all versions matching the ZKBioSecurity product line under ZKTeco Inc. Based on the CVE naming convention (CVE-2016-*), this vulnerability was disclosed in 2016. Specific patched versions are not explicitly detailed in provided references, but the VulnCheck advisory (https://www.vulncheck.com/advisories/zkteco-zkbiosecurity-multiple-reflected-xss-vulnerabilities) likely contains version-specific remediation guidance.

Remediation

Immediate actions: (1) Update ZKTeco ZKBioSecurity to a patched version released after the 2016 disclosure—consult https://www.vulncheck.com/advisories/zkteco-zkbiosecurity-multiple-reflected-xss-vulnerabilities for version information; (2) Review ZKTeco vendor advisories for specific patch availability and upgrade procedures; (3) If immediate patching is impossible, implement compensating controls: restrict access to ZKBioSecurity administration interfaces via network segmentation and firewall rules, use Web Application Firewall (WAF) rules to detect and block XSS payloads (e.g., <script> tags in URL parameters), enforce HTTPOnly and Secure flags on session cookies to prevent script-based session theft, and educate users against clicking untrusted links to the application. (4) Monitor for exploitation attempts using intrusion detection patterns matching the POC from PacketStorm Security (https://packetstormsecurity.com/files/138568). Long-term: upgrade to ZKBioSecurity 4.x or later (if available) or migrate to alternative vendor biometric systems with modern security practices.

Priority Score

51
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +30
POC: +20

Share

EUVD-2016-10809 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy