The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuration data. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
References
Configurations
No configuration.
History
22 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuration data. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application. |
21 Oct 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-321 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.1 |
21 Oct 2025, 19:31
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-21 19:21
Updated : 2025-10-22 14:15
NVD link : CVE-2025-56801
Mitre link : CVE-2025-56801
CVE.ORG link : CVE-2025-56801
JSON object : View
Products Affected
No product.
CWE
CWE-321
Use of Hard-coded Cryptographic Key
