#VU49880 Use of Hard-coded Cryptographic Key in P2P protocol


Published: 2021-01-20

Vulnerability identifier: #VU49880

Vulnerability risk: Low

CVSSv3.1: 6.7 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-25173

CWE-ID: CWE-321

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
P2P protocol
Server applications / Other server solutions

Vendor: Reolink

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to presence of a hard-coded cryptographic key. A local attacker can obtain a fixed cryptography key and compromise the Reolink P2P cameras outside of local network access.

This vulnerability affects the following Reolink devices using P2P: 

  • RLC-4XX series
  • RLC-5XX series
  • RLN-X10 series

Mitigation
Install updates from vendor's website.

Vulnerable software versions

P2P protocol: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsa-21-019-02


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability