CVE-2021-4228
Use of hard-coded TLS certificate by default allows an attacker to perform Man-in-the-Middle (MitM) attacks even in the presence of the HTTPS connection.
An un-authenticated remote attacker would be able to perform Man-in-the-Middle (MitM) attacks against users, breaking the confidentiality and integrity of the data exchanged via HTTPS.
October 21, 2022
The vulnerability affects: Lanner Inc IAC-AST2500A standard firmware version 1.00.0
CVE-2021-4228
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
5.8
Updated BMC firmware versions that fix the issue are available from Lanner technical support
Andrea Palanca of Nozomi Networks
Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.
Learn more

