CVE-2025-56800

5.1 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to bypass the lock screen authentication in Reolink desktop applications by modifying client-side JavaScript. It affects users of Reolink desktop software who have enabled the lock screen feature. The vendor disputes the severity since exploitation requires local access to modify the application.

💻 Affected Systems

Products:
  • Reolink Desktop Application
Versions: 8.18.12 and potentially earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the lock screen feature is enabled. The vulnerability exists in the Electron-based desktop application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to a logged-in workstation could bypass the lock screen and gain unauthorized access to the Reolink application and connected camera feeds.

🟠

Likely Case

Local users with basic technical knowledge could bypass their own lock screen to access the application without proper authentication.

🟢

If Mitigated

With proper physical security controls and user awareness, the impact is minimal since exploitation requires local access to the system.

🌐 Internet-Facing: LOW - This is a local client-side vulnerability that cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Requires physical or local access to the workstation, but could allow unauthorized access to surveillance systems in shared environments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to modify JavaScript files. Public proof-of-concept demonstrates patching the a.settingsManager.lockScreenPassword property.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Reolink for updated version

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Open Reolink desktop application
2. Navigate to Settings > About
3. Check for updates and install latest version
4. Restart the application

🔧 Temporary Workarounds

Disable Lock Screen Feature

all

Temporarily disable the lock screen functionality until patched

Application Sandboxing

all

Run Reolink application in restricted/sandboxed environment to prevent file modification

🧯 If You Can't Patch

  • Implement strict physical security controls for workstations running Reolink
  • Disable lock screen feature and rely on operating system authentication instead

🔍 How to Verify

Check if Vulnerable:

Check if running version 8.18.12 or earlier with lock screen enabled. Examine JavaScript files for client-side password storage.

Check Version:

In Reolink application: Settings > About > Version

Verify Fix Applied:

Verify application version is updated beyond 8.18.12. Test lock screen functionality to ensure proper server-side validation.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Reolink application
  • Modification of application resource files

Network Indicators:

  • Unusual camera access patterns from previously locked workstations

SIEM Query:

Process creation events for Reolink executable followed by file modification events in application directories

🔗 References

📤 Share & Export