PatchSiren cyber security CVE debrief
CVE-2016-10205 Zoneminder CVE debrief
CVE-2016-10205 is a high-severity session fixation issue in Zoneminder 1.30.0 and earlier. NVD states that remote attackers could hijack web sessions via the ZMSESSID cookie. The record maps this issue to CWE-384 and assigns a CVSS 3.0 score of 7.3, reflecting a network-reachable attack with no privileges or user interaction required.
- Vendor
- Zoneminder
- Product
- CVE-2016-10205
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-03
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Zoneminder deployments, especially instances running 1.30.0 or earlier and any web-accessible installation that uses browser sessions for administration.
Technical summary
The NVD record describes a session fixation weakness affecting Zoneminder versions through 1.30.0. The weakness is identified as CWE-384. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) indicates a remote attack path with no authentication or user interaction required, and limited but real impact to confidentiality, integrity, and availability through session hijacking.
Defensive priority
High. The issue is remotely exploitable, requires no user interaction, and can lead to web-session takeover, so it should be prioritized for patching and session hygiene.
Recommended defensive actions
- Upgrade Zoneminder to a version newer than 1.30.0.
- Invalidate existing web sessions after remediation so any fixed or stolen ZMSESSID values cannot be reused.
- Review authentication and web-access logs for signs of unauthorized session use or account activity.
- If immediate patching is not possible, limit access to the Zoneminder web interface to trusted users and networks until remediation is complete.
Evidence notes
This debrief is based on the official NVD CVE record and its linked references. The vulnerable range is taken from the NVD CPE criteria ending at 1.30.0, the weakness mapping is CWE-384, and the CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. The record also links to a mailing list reference, a SecurityFocus BID entry, and a FoxMole advisory; those references were not independently re-scraped beyond the metadata supplied here.
Official resources
-
CVE-2016-10205 CVE record
CVE.org
-
CVE-2016-10205 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Exploit, Mailing List
- Source reference
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
Publicly disclosed in the CVE record on 2017-03-03. The NVD entry was last modified on 2026-05-13. Related references are listed in the record, including a mailing list post, a SecurityFocus BID entry, and a FoxMole advisory.