ZKTeco CCTV Cameras: Unauthenticated Port Exposes Critical Data (CVE-2026-8598)

ZKTeco CCTV Cameras: Unauthenticated Port Exposes Critical Data (CVE-2026-8598)

The National Vulnerability Database has detailed CVE-2026-8598, a critical vulnerability impacting some ZKTeco CCTV camera models. This flaw stems from an undocumented configuration export port that is accessible without authentication. This isn’t just a minor info leak; it’s a direct pipeline to sensitive camera details.

Attackers exploiting this port can extract critical information, including open services and, more alarmingly, camera account credentials. The National Vulnerability Database assigns this a CVSS score of 9.1 (CRITICAL), underscoring the severe risk of complete compromise. An unauthenticated attacker can effectively take over the device.

This vulnerability, categorized under CWE-288 (Authentication Bypass Using an Alternate Path or Channel), means any internet-exposed ZKTeco camera with this flaw is an open book. Defenders need to assume compromise if these devices are unpatched and accessible.

What This Means For You

  • If your organization uses ZKTeco CCTV cameras, you need to immediately identify all instances and determine if they are affected by CVE-2026-8598. Prioritize patching or isolating any cameras with public exposure. Assume any unpatched, internet-facing ZKTeco camera is compromised and rotate credentials immediately.

Related ATT&CK Techniques

🛡️ Detection Rules

6 rules · 6 SIEM formats

6 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-8598

Sigma YAML — free preview
title: Web Application Exploitation Attempt — CVE-2026-8598
id: scw-2026-05-20-1
status: experimental
level: high
description: |
  Detects common exploitation patterns targeting web applications. Review CVE-2026-8598 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-05-20
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-8598/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
        - '..'
        - 'SELECT'
        - 'UNION'
        - '<script'
        - 'cmd='
        - '/etc/passwd'
      condition: selection
falsepositives:
  - Legitimate activity from CVE-2026-8598

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-8598 Information Disclosure ZKTeco CCTV cameras (some models) - undocumented configuration export port
CVE-2026-8598 Auth Bypass ZKTeco CCTV cameras (some models) - configuration export port does not require authentication
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma