LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2016-20030

CVE-2016-20030 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 16, 2026

ZKTeco ZKBioSecurity - Authentication Bypass

Published: March 16, 2026Updated: March 16, 2026Remote Exploitable

Overview

ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability caused by differing responses to partial username inputs in authLoginAction!login.do, letting unauthenticated attackers discover valid usernames, exploit requires no authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 5.6%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can discover valid usernames, aiding further targeted attacks like brute force or phishing.

Mitigation

Update to the latest version or apply vendor patches addressing user enumeration.

Social Media Activity(1 post)

Yazoul - Cybersecurity Alerts
Yazoul - Cybersecurity Alerts
@Matchbook3469
Mar 17, 2026

🔴 New security advisory: CVE-2016-20030 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://www.yazoul.net/advisory/cve/cve-2016-20030-zkteco-zkbiosecurity-3-0-user-enumeration #Cybersecurity #SecurityPatching #HackerNews

View original post

Details

CVE ID
CVE-2016-20030
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
unconfirmed
EPSS
5.6%
Social Posts
1

CWE

  • CWE-551

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

5.6%Probability of exploitation in the next 30 days