CVE-2026-8598

ZKTeco · CCTV Cameras

Certain ZKTeco CCTV cameras expose an undocumented, unauthenticated configuration export port that reveals sensitive information, including account credentials.

Executive summary

An unauthenticated configuration export vulnerability in ZKTeco CCTV cameras allows attackers to extract sensitive system credentials and service information.

Vulnerability

This is an information disclosure vulnerability. An undocumented, unauthenticated port on the device provides access to a configuration export feature, which transmits sensitive data, including credentials, in plaintext.

Business impact

The exposure of administrative credentials enables full, unauthorized access to the camera system. This could be leveraged for surveillance, credential stuffing against other internal systems, or persistent network infiltration. The 9.1 CVSS score reflects the high risk of this data exposure.

Remediation

Immediate Action: Apply the latest security firmware update from ZKTeco.

Proactive Monitoring: Scan internal networks for ZKTeco devices and monitor for unauthorized connections to known configuration or management ports.

Compensating Controls: Block access to the identified configuration port via local firewall rules and ensure the cameras are placed on a restricted, non-public network.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should immediately update their ZKTeco camera firmware to disable the insecure configuration port. If updates are not immediately available, restrict network access to the devices to prevent unauthorized access.