<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ZKTeco — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/zkteco/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/zkteco/feed.xml" rel="self" type="application/rss+xml"/><item><title>ZKTeco CCTV Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-zkteco-cctv-auth-bypass/</link><pubDate>Tue, 19 May 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zkteco-cctv-auth-bypass/</guid><description>ZKTeco CCTV cameras are vulnerable to authentication bypass due to an undocumented configuration export port that does not require authentication and exposes critical information about the camera, such as open services and account credentials, as tracked by CVE-2026-8598.</description><content:encoded><![CDATA[<p>An authentication bypass vulnerability exists in ZKTeco CCTV cameras, specifically affecting the SSC335-GC2063-Face-0b77 Solution versions prior to V5.0.1.2.20260421. CVE-2026-8598 describes how an undocumented configuration export port is accessible without authentication, which exposes critical information, including camera account credentials and open services. Successful exploitation of this vulnerability allows unauthorized access to sensitive camera data. This vulnerability was reported to CISA by Souvik Kandar. ZKTeco released a patch in firmware version V5.0.1.2.20260421.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable ZKTeco CCTV camera exposed on a network.</li>
<li>Attacker sends a request to the undocumented configuration export port.</li>
<li>The camera responds with a configuration file without requiring authentication.</li>
<li>Attacker parses the configuration file.</li>
<li>Attacker extracts sensitive information, including camera account credentials, from the configuration file.</li>
<li>Attacker uses the obtained credentials to access the camera&rsquo;s management interface.</li>
<li>Attacker gains unauthorized access to live video feeds and camera settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8598 can lead to unauthorized access to sensitive video and audio data. This may result in privacy violations, intellectual property theft, or facilitate further malicious activities, such as physical intrusions. The vulnerability affects ZKTeco CCTV cameras deployed worldwide, including in commercial facilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ZKTeco CCTV cameras to firmware version V5.0.1.2.20260421 or later to remediate CVE-2026-8598.</li>
<li>Use the IOC URL <code>https://www.zkteco.com/en/announcement/23</code> to monitor for updates and further information from ZKTeco.</li>
<li>Enable network monitoring to detect suspicious connections to undocumented ports on ZKTeco cameras and deploy the Sigma rule to detect connections to common ports used by these devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>authentication-bypass</category><category>information-disclosure</category></item></channel></rss>