Логотип exploitDog
bind:CVE-2025-56802
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-56802

Количество 2

Количество 2

nvd логотип

CVE-2025-56802

4 месяца назад

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.

CVSS3: 5.1
EPSS: Низкий
github логотип

GHSA-rgw8-cv8p-crp3

4 месяца назад

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56802.

CVSS3: 5.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-56802

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.

CVSS3: 5.1
0%
Низкий
4 месяца назад
github логотип
GHSA-rgw8-cv8p-crp3

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56802.

CVSS3: 5.1
0%
Низкий
4 месяца назад

Уязвимостей на страницу