The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/Jun/0 | Exploit Mailing List Third Party Advisory |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-07-17T21:36:27
Updated: 2022-07-17T21:39:43
Reserved: 2021-08-27T00:00:00
Link: CVE-2021-40149
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-17T22:15:08.683
Modified: 2022-07-27T17:21:19.037
Link: CVE-2021-40149
JSON object: View
Redhat Information
No data.
CWE