CVE-2016-20026
PUBLISHED
Published: 15 Mar 2026, 13:35
Last modified:15 Mar 2026, 13:35
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.8 CRITICAL
v3.1 (cve.org)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
2 found
Dark Web
Not detected
Timeline
15 Mar 2026, 13:35
Published
Vulnerability first disclosed
Description
ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache Tomcat server that allow unauthenticated attackers to access the manager application. Attackers can authenticate with hardcoded credentials stored in tomcat-users.xml to upload malicious WAR archives containing JSP applications and execute arbitrary code with SYSTEM privileges.
CVSS Metrics
- v4.0•CRITICAL•Score: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Techniques & Countermeasures
- CWE-798•Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.
Affected Systems
- zkteco inc.•zkteco zkbiosecurity
3.0.1.0_R_230
References (6)
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5362.php
- https://cxsecurity.com/issue/WLB-2016080266
- https://exchange.xforce.ibmcloud.com/vulnerabilities/116484
- https://packetstormsecurity.com/files/138567
- https://www.exploit-db.com/exploits/40324/
- https://www.vulncheck.com/advisories/zkteco-zkbiosecurity-hardcoded-credentials-remote-code-execution