Attack

CISA warns of ZKTeco BioTime flaw actively exploited in State-Sponsored attacks

Take action: If you are using ZKTeco BioTime time to patch it. The attackers targeting these systems are well funded and skilled. Check for any indicators of compromise and patch ASAP!


Learn More

CISA has added a high-severity vulnerability affecting ZKTeco BioTime to its Known Exploited Vulnerabilities (KEV) catalog following evidence of active exploitation in the wild. 

BioTime is a web-based time and attendance management software that integrates with biometric authentication devices and provides connectivity to thousands of ZKTeco's standalone devices through various communication channels including Ethernet, WiFi, 3G, and 4G networks.

The vulnerability is tracked as CVE-2023-38950 (CVSS score 7.5), is a path traversal vulnerability in the iclock API that allows an unauthenticated attacker to read arbitrary files via supplying a crafted payload. 

Apparently, it has been actively exploited by Iranian state-sponsored hackers targeting critical infrastructure in the Middle East. Organizations using ZKTeco BioTime are advised to apply available patches and use security scanners to check whether their systems are internet-facing, which increases the risk of exploitation.

CISA warns of ZKTeco BioTime flaw actively exploited in State-Sponsored attacks