iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.
Fixes

Solution

The vendor was unresponsive and did not answer to our communication attempts. Therefore, a patch is not available for these security issues. End users of this product should contact the vendor and demand a patch.


Workaround

No workaround given by the vendor.

History

Thu, 25 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 25 Sep 2025 14:45:00 +0000

Type Values Removed Values Added
Description iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.
Title Insecure Default Admin Credentials Enable Full Administrative Access in iMonitor EAM
Weaknesses CWE-1392
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-09-25T18:24:22.849Z

Reserved: 2025-09-16T07:44:52.501Z

Link: CVE-2025-10542

cve-icon Vulnrichment

Updated: 2025-09-25T18:24:12.983Z

cve-icon NVD

Status : Received

Published: 2025-09-25T15:16:09.487

Modified: 2025-09-25T19:15:43.077

Link: CVE-2025-10542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.