Organizations are adopting biometric authentication to optimize entry management and so as to add a main or auxiliary authentication issue for accessing company info programs. Biometrics are excellent for the job: such knowledge can’t be forgotten like a password, or misplaced like a keypass, and could be very arduous to forge. Safety not has to take care of misplaced or forgotten playing cards, and the IT safety group doesn’t have to provide you with OTP programs. Nonetheless, there are a selection of “buts” to think about when evaluating such implementations:
- Dangers related to storing and processing biometric info (regulated by regulation in lots of international locations);
- Sensible difficulties associated to false positives and negatives (strongly depending on the kind of biometrics and technique of verification);
- Dangers of authentication bypass;
- Dangers of cyberattacks by means of vulnerabilities within the biometric terminal.
The primary two factors are often coated by safety personnel, however the remaining are sometimes underestimated. But, as our in-depth research of standard ZKTeco biometric terminals reveals, under no circumstances are they far-fetched. These terminals have been discovered to harbor 24 vulnerabilities that permit menace actors to effortlessly bypass authentication, hijack the gadget, learn or modify the checklist of customers, obtain their photographs and different knowledge, and exploit entry to the gadget to develop an assault on the company community. Right here’s how attackers can use these vulnerabilities.
QR code as a substitute of a face
The biometric terminal mannequin studied by our consultants can retailer a database of customers domestically and authenticate them in one in all a number of methods: password, QR code, face picture biometrics, or digital move. Because it turned out, merely scanning a QR code containing the trivial SQL injection is sufficient to validate authentication on the gadget and open the doorways. And if an excessive amount of knowledge is embedded within the QR code, the terminal reboots. To hold out these assaults, an attacker solely must method the gadget with a cellphone or perhaps a paper card.
Insecure community entry
The terminal might be managed both domestically or over the community utilizing SSH or a proprietary community protocol utilizing the TCP port 4370. The protocol requires authentication, however the process’s implementation incorporates severe errors. The password is an integer from 0 to 999999, which is simple to brute-force, and its default worth is, in fact, zero. The message authentication code (MAC) makes use of reversible operations, making it simple to investigate community visitors and, if needed, get better the password by means of it. SSH entry is offered to root and zkteco customers whose passwords might be recovered by means of accessing the gadget reminiscence.
System hijacking
The producer supplies the power to entry person knowledge remotely, obtain photographs, add new customers, and so forth. Given the insecure implementation of the proprietary protocol, this creates a threat of non-public knowledge leakage, together with biometrics. Risk actors may also add third events to the database and exclude reliable staff.
On high of that, errors in processing protocol instructions give attackers much more choices, akin to injecting Unix shell system instructions into picture processing instructions and studying arbitrary system recordsdata on the terminal, proper all the way down to the password-containing /and so on/shadow.
What’s extra, buffer overflow vulnerabilities within the firmware replace command permit arbitrary code execution on the gadget. This creates enticing alternatives for attackers to increase their presence within the community. For the reason that biometric terminal could have no EDR agent or different safety instruments, it’s effectively fitted to reconnaissance operations and routing visitors between compromised units — if, in fact, the terminal itself is related to the interior community with out further restrictions.
How you can cut back the dangers of assaults by means of biometric terminals
ZKTeco units are used worldwide below totally different model names. If the units within the illustration appear to be these in your workplace, it’s value updating the firmware and scrutinizing the settings to make them safer. Both method, varied flaws in biometric terminals must be taken under consideration whatever the particular producer. We suggest the next measures:
- Select a biometric terminal provider fastidiously. Conduct preliminary evaluation of beforehand recognized vulnerabilities in its tools and the time taken to get rid of them. Request details about the provider’s software program engineering practices, giving choice to producers that use a safe improvement lifecycle (SDL). Additionally request an in depth description of how info is saved, together with biometrics.
- Grasp the tools settings and use probably the most safe configuration. We suggest disabling pointless and insecure authentication strategies in addition to unused providers and options. Change all default credentials to sturdy and distinctive passwords for all biometric terminal directors and customers.
- Bodily block pointless connectors and interfaces on the terminal to get rid of sure assault vectors.
- Embody terminals in replace and vulnerability administration processes.
- Isolate the community. If terminals are related to the native community and linked to a administration server, we suggest shifting them to a separate bodily or digital subnet (VLAN) to rule out entry to terminals from common computer systems and servers, and vice versa. To configure entry, we advise utilizing a privileged entry workstation remoted from common community exercise.
- Think about telemetry from terminals as a supply of knowledge for the SIEM system and different deployed monitoring instruments.



