CVE-2021-4228
low-risk
Published 2022-10-24
Use of hard-coded TLS certificate by default allows an attacker to perform Man-in-the-Middle (MitM) attacks even in the presence of the HTTPS connection. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.00.0.
Do I need to act?
-
0.81% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.8/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Iac-Ast2500 Firmware
Affected Vendors
References (4)
Third Party Advisory
https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-io...
Third Party Advisory
https://www.nozominetworks.com/labs/vulnerability-advisories/cve-2021-4228/
Third Party Advisory
https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-io...
Third Party Advisory
https://www.nozominetworks.com/labs/vulnerability-advisories/cve-2021-4228/
26
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal