This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the targeted device.
Successful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device. | |
Title | Hard-coded Private Key Vulnerability in ZKTeco WL20 | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published: 2025-08-13T11:23:53.500Z
Updated: 2025-08-13T13:01:28.876Z
Reserved: 2025-08-12T11:08:57.777Z
Link: CVE-2025-55279

Updated: 2025-08-13T13:01:26.397Z

Status : Awaiting Analysis
Published: 2025-08-13T12:15:26.907
Modified: 2025-08-13T17:33:46.673
Link: CVE-2025-55279

No data.