Skip to content

Latest commit

 

History

History
27 lines (23 loc) · 1.66 KB

K-ZkTeco-2023-006.md

File metadata and controls

27 lines (23 loc) · 1.66 KB

Kaspersky Advisory

(K-ZkTeco-2023-006) Multiple buffer overflow in ZkTeco-based OEM devices


Affected Hardware/Software

ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others

Severity level

Impact: Some of the described vulnerabilities impose restrictions on input data, for example, data is copied to zero bytes, which makes successful exploitation quite difficult, but not impossible. Due to the lack of protection mechanisms against exploitation: stack canary, PIE, it is possible to successfully execute code even in cases with restrictions.

Access Vector: Remote

CVSS v3 Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS v3 Score

10.0

CVE ID

CVE-2023-3943

Vulnerability description

Multiple buffer overflow vulnerabilities were identified in an executable and a library on a device. These vulnerabilities stem from the improper handling of user-controlled data, which is copied to stack buffers without size checks using unsafe functions like strcpy and sprintf. The issues occur across several command handlers and processing functions, allowing for potential overflows when excess data is received. These vulnerabilities can lead to stack buffer overflows and potentially result in arbitrary code execution.

Remediation

Apply patch from vendor when it will be available for your device.

Acknowledgements

Vulnerability was discovered by Georgy Kiguradze from Kaspersky.

Reference

https://github.com/klsecservices/Publications/blob/master/QR_code_SQL_injection_and_other_vulnerabilities_in_a_popular_biometric_terminal_EN.pdf