First published: Tue Jan 26 2021(Updated: )
An attacker with local network access can obtain a fixed cryptography key which may allow for further compromise of Reolink P2P cameras outside of local network access
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Reolink Rln8-410 Firmware | ||
Reolink Rln8-410 | ||
Reolink Rlc-422 Firmware | ||
Reolink Rlc-422 | ||
Reolink Rlc-510a Firmware | ||
Reolink Rlc-510a | ||
Reolink Rlc-423s Firmware | ||
Reolink Rlc-423s | ||
Reolink Rlc-423 Firmware | ||
Reolink Rlc-423 | ||
Reolink Rlc-410 Firmware | ||
Reolink Rlc-410 | ||
Reolink Rlc-520a Firmware | ||
Reolink Rlc-520a | ||
Reolink RLC-4XX series | ||
Reolink RLC-5XX series | ||
Reolink RLN-X10 series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-25173.
The severity of CVE-2020-25173 is high with a severity value of 7.8.
Reolink Rln8-410 Firmware, Reolink Rlc-422 Firmware, Reolink Rlc-510a Firmware, Reolink Rlc-423s Firmware, Reolink Rlc-423 Firmware, and Reolink Rlc-410 Firmware are affected by CVE-2020-25173.
An attacker with local network access can obtain a fixed cryptography key which may allow for further compromise of Reolink P2P cameras outside of local network access.
To fix CVE-2020-25173, it is recommended to install the latest firmware version provided by Reolink.