CVE-2025-55622

6.5 MEDIUM

📋 TL;DR

This CVE describes a task hijacking vulnerability in Reolink software where inappropriate taskAffinity settings could allow malicious apps to intercept legitimate app tasks. This affects users of Reolink's mobile applications on Android devices. The vendor disputes this as a vulnerability, claiming it's intentional behavior for user experience.

💻 Affected Systems

Products:
  • Reolink mobile applications
Versions: v4.54.0.4.20250526 (specific version mentioned)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vendor disputes this as a vulnerability, claiming it's intentional design. Requires malicious app installation on same Android device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app could intercept sensitive camera feeds, credentials, or control commands, potentially leading to unauthorized surveillance or account compromise.

🟠

Likely Case

Limited data exposure through task interception, potentially revealing some app state information to malicious applications.

🟢

If Mitigated

Minimal impact with proper Android security controls and app isolation mechanisms in place.

🌐 Internet-Facing: LOW - Requires local malicious app installation, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires user to install malicious app from untrusted sources on same device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires malicious app development and user installation. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not applicable - vendor disputes vulnerability

Vendor Advisory: None provided

Restart Required: No

Instructions:

No official patch as vendor disputes this is a vulnerability. Consider updating to latest Reolink app version if available.

🔧 Temporary Workarounds

Restrict app installation sources

android

Only install apps from official Google Play Store to reduce risk of malicious apps

Review app permissions

android

Regularly review and restrict unnecessary app permissions on Android device

🧯 If You Can't Patch

  • Monitor for suspicious app behavior and unauthorized access attempts
  • Implement mobile device management (MDM) controls to restrict app installations

🔍 How to Verify

Check if Vulnerable:

Check Reolink app version in Android settings > Apps > Reolink > App info

Check Version:

Not applicable - check through Android UI

Verify Fix Applied:

Update to latest Reolink app version from official app store

📡 Detection & Monitoring

Log Indicators:

  • Unusual app task switching or interception events in Android logs

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Not applicable for typical enterprise monitoring

🔗 References

📤 Share & Export