Metrics
Affected Vendors & Products
Solution
The vendor was unresponsive and did not answer to our communication attempts. Therefore, a patch is not available for these security issues. End users of this product should contact the vendor and demand a patch.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://r.sec-consult.com/imonitor |
![]() ![]() |
Thu, 25 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | iMonitor EAM 9.6394 transmits communication between the EAM client agent and the EAM server, as well as between the EAM monitor management software and the server, in plaintext without authentication or encryption. An attacker with network access can intercept sensitive information (such as credentials, keylogger data, and personally identifiable information) and tamper with traffic. This allows both unauthorized disclosure and modification of data, including issuing arbitrary commands to client agents. | |
Title | Unencrypted and Unauthenticated Communication Allows Data Exposure and Manipulation in iMonitor EAM | |
Weaknesses | CWE-319 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-09-25T18:56:01.197Z
Reserved: 2025-09-16T07:44:29.591Z
Link: CVE-2025-10540

Updated: 2025-09-25T18:55:57.361Z

Status : Awaiting Analysis
Published: 2025-09-25T14:15:42.203
Modified: 2025-09-26T14:32:53.583
Link: CVE-2025-10540

No data.

No data.