Vulnerability Description
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zkteco | Biotime | < 9.0.1 |
Related Weaknesses (CWE)
References
- http://zkteco.comProduct
- https://claroty.com/team82/disclosure-dashboard/cve-2023-38950Third Party Advisory
- http://zkteco.comProduct
- https://claroty.com/team82/disclosure-dashboard/cve-2023-38950Third Party Advisory
- https://sploitus.com/exploit?id=PACKETSTORM:177859Exploit
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-US Government Resource
- https://www.fortinet.com/content/dam/fortinet/assets/reports/report-incident-resTechnical Description
FAQ
What is CVE-2023-38950?
CVE-2023-38950 is a vulnerability with a CVSS score of 7.5 (HIGH). A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in vers...
How severe is CVE-2023-38950?
CVE-2023-38950 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38950?
Check the references section above for vendor advisories and patch information. Affected products include: Zkteco Biotime.