Insecure access control in ZKTeco BioTime through 9.0.1 allows authenticated attackers to escalate their privileges due to the fact that session ids are not validated for the type of user accessing the application by default. Privilege restrictions between non-admin and admin users are not enforced and any authenticated user can leverage admin functions without restriction by making direct requests to administrative endpoints.
References
Configurations
History
19 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) Insecure access control in ZKTeco BioTime through 9.0.1 allows authenticated attackers to escalate their privileges due to the fact that session ids are not validated for the type of user accessing the application by default. Privilege restrictions between non-admin and admin users are not enforced and any authenticated user can leverage admin functions without restriction by making direct requests to administrative endpoints. |
05 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://zkteco.com - Product | |
References | () https://claroty.com/team82/disclosure-dashboard/cve-2023-38952 - Third Party Advisory |
Information
Published : 2023-08-03 23:15
Updated : 2025-05-19 21:15
NVD link : CVE-2023-38952
Mitre link : CVE-2023-38952
CVE.ORG link : CVE-2023-38952
JSON object : View
Products Affected
zkteco
- biotime
CWE
CWE-552
Files or Directories Accessible to External Parties