ZKTeco BioTime <9.5.2: Unprotected Credentials via backup_encryption_password_decrypt
CVE-2025-15128 Published on December 28, 2025
ZKTeco BioTime Endpoint safe_setting credentials storage
A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing a manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update 1 day later.
Weakness Types
Unprotected Storage of Credentials
Storing a password in plaintext may result in a system compromise. Password management issues occur when a password is stored in plaintext in an application's properties or configuration file. Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource.
Credentials Management Errors
Weaknesses in this category are related to the management of credentials.
Products Associated with CVE-2025-15128
Want to know whenever a new CVE is published for Zkteco Biotime? stack.watch will email you.
Affected Versions
ZKTeco BioTime:- Version 9.0.0 is affected.
- Version 9.0.1 is affected.
- Version 9.0.2 is affected.
- Version 9.0.3 is affected.
- Version 9.0.4 is affected.
- Version 9.5.0 is affected.
- Version 9.5.1 is affected.
- Version 9.5.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.