ZKTeco BioTime <9.5.2: Unprotected Credentials via backup_encryption_password_decrypt
CVE-2025-15128 Published on December 28, 2025

ZKTeco BioTime Endpoint safe_setting credentials storage
A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing a manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update 1 day later.

Weakness Types

Unprotected Storage of Credentials

Storing a password in plaintext may result in a system compromise. Password management issues occur when a password is stored in plaintext in an application's properties or configuration file. Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource.

Credentials Management Errors

Weaknesses in this category are related to the management of credentials.


Products Associated with CVE-2025-15128

Want to know whenever a new CVE is published for Zkteco Biotime? stack.watch will email you.

 

Affected Versions

ZKTeco BioTime:

Exploit Probability

EPSS
0.02%
Percentile
6.34%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.