Metrics
Affected Vendors & Products
Solution
The vendor was unresponsive and did not answer to our communication attempts. Therefore, a patch is not available for these security issues. End users of this product should contact the vendor and demand a patch.
Workaround
No workaround given by the vendor.
Thu, 25 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients. | |
Title | Insecure Default Admin Credentials Enable Full Administrative Access in iMonitor EAM | |
Weaknesses | CWE-1392 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-09-25T18:24:22.849Z
Reserved: 2025-09-16T07:44:52.501Z
Link: CVE-2025-10542

Updated: 2025-09-25T18:24:12.983Z

Status : Received
Published: 2025-09-25T15:16:09.487
Modified: 2025-09-25T19:15:43.077
Link: CVE-2025-10542

No data.

No data.