PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-10205 Zoneminder CVE debrief

CVE-2016-10205 is a high-severity session fixation issue in Zoneminder 1.30.0 and earlier. NVD states that remote attackers could hijack web sessions via the ZMSESSID cookie. The record maps this issue to CWE-384 and assigns a CVSS 3.0 score of 7.3, reflecting a network-reachable attack with no privileges or user interaction required.

Vendor
Zoneminder
Product
CVE-2016-10205
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-03
Original CVE updated
2026-05-13
Advisory published
2017-03-03
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Zoneminder deployments, especially instances running 1.30.0 or earlier and any web-accessible installation that uses browser sessions for administration.

Technical summary

The NVD record describes a session fixation weakness affecting Zoneminder versions through 1.30.0. The weakness is identified as CWE-384. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) indicates a remote attack path with no authentication or user interaction required, and limited but real impact to confidentiality, integrity, and availability through session hijacking.

Defensive priority

High. The issue is remotely exploitable, requires no user interaction, and can lead to web-session takeover, so it should be prioritized for patching and session hygiene.

Recommended defensive actions

  • Upgrade Zoneminder to a version newer than 1.30.0.
  • Invalidate existing web sessions after remediation so any fixed or stolen ZMSESSID values cannot be reused.
  • Review authentication and web-access logs for signs of unauthorized session use or account activity.
  • If immediate patching is not possible, limit access to the Zoneminder web interface to trusted users and networks until remediation is complete.

Evidence notes

This debrief is based on the official NVD CVE record and its linked references. The vulnerable range is taken from the NVD CPE criteria ending at 1.30.0, the weakness mapping is CWE-384, and the CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. The record also links to a mailing list reference, a SecurityFocus BID entry, and a FoxMole advisory; those references were not independently re-scraped beyond the metadata supplied here.

Official resources

Publicly disclosed in the CVE record on 2017-03-03. The NVD entry was last modified on 2026-05-13. Related references are listed in the record, including a mailing list post, a SecurityFocus BID entry, and a FoxMole advisory.