EUVD-2016-10811

| CVE-2016-20028 MEDIUM
2026-03-15 VulnCheck
4.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
EUVD ID Assigned
Mar 15, 2026 - 14:00 euvd
EUVD-2016-10811
Analysis Generated
Mar 15, 2026 - 14:00 vuln.today
CVE Published
Mar 15, 2026 - 13:35 nvd
MEDIUM 4.3

Description

ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious websites. Attackers can craft HTTP requests that add superadmin accounts without validity checks, enabling unauthorized administrative access when authenticated users visit attacker-controlled pages.

Analysis

ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery (CSRF) vulnerability that allows authenticated attackers to perform unauthorized administrative actions, specifically adding superadmin accounts without proper validation. An attacker can craft malicious HTTP requests that, when visited by a logged-in administrator, silently create new superadmin credentials, effectively granting the attacker persistent unauthorized administrative access. This vulnerability requires user interaction (a logged-in admin must visit an attacker-controlled page) but does not require elevated privileges to trigger, presenting a moderate but real risk to organizations using this biometric access control system.

Technical Context

The vulnerability exploits the absence of CSRF tokens or similar anti-CSRF mechanisms in ZKTeco ZKBioSecurity 3.0's administrative account creation endpoints. When a web application fails to validate that state-changing requests (such as adding users) originate from legitimate, authenticated sessions rather than cross-origin requests, it becomes vulnerable to CSRF attacks as defined by CWE-352. ZKBioSecurity is a biometric access control and time-attendance management platform deployed in enterprise environments, typically running on internal networks or cloud infrastructure. The absence of validity checks on superadmin account creation suggests that the application trusts the browser context of authenticated users implicitly, allowing an attacker to forge requests that the browser will automatically include with valid session cookies when the user visits a malicious site. This is a classic CSRF weakness in web applications handling sensitive operations without proper request origin validation or cryptographic tokens.

Affected Products

ZKTeco ZKBioSecurity versions 3.0 and likely earlier versions are affected by this CSRF vulnerability. Exact version boundaries have not been disclosed in publicly available references, but ZKBioSecurity 3.0 is explicitly mentioned as vulnerable. Organizations should check with ZKTeco for patch availability and version guidance. The product is commonly deployed in enterprise biometric access control installations across manufacturing, healthcare, and corporate environments.

Remediation

Upgrade ZKTeco ZKBioSecurity to the latest patched version provided by ZKTeco after confirming availability of security updates from the vendor. Until patching is possible, implement compensating controls: enforce HTTPS-only communication to all ZKBioSecurity administrative interfaces, restrict administrative access to trusted internal IP ranges via firewall rules, require VPN access for remote administration, and implement HSTS headers on the application. Conduct user awareness training to reduce the risk of administrators visiting untrusted websites while logged into administrative systems. Additionally, review and verify that ZKBioSecurity administrative endpoints implement proper CSRF token validation on all state-changing operations (POST/PUT/DELETE requests), and if not available in the current version, contact ZKTeco for patch timelines and interim guidance.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +22
POC: +20

Share

EUVD-2016-10811 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy