CVE-2025-56802

medium

Description

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.

References

https://shinycolumn.notion.site/reolink-aes-key

https://github.com/shinyColumn/CVE-2025-56802

Details

Source: Mitre, NVD

Published: 2025-10-21

Updated: 2025-10-22

Risk Information

CVSS v2

Base Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P

Severity: Low

CVSS v3

Base Score: 5.1

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

Severity: Medium

EPSS

EPSS: 0.00008