The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html | Exploit Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2022/Jun/0 | Exploit Mailing List Third Party Advisory | 
| https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2022-07-17 22:15
Updated : 2022-07-27 17:21
NVD link : CVE-2021-40149
Mitre link : CVE-2021-40149
CVE.ORG link : CVE-2021-40149
JSON object : View
Products Affected
                reolink
- e1_zoom_firmware
 - e1_zoom
 
CWE
                
                    
                        
                        CWE-552
                        
            Files or Directories Accessible to External Parties
