Hard-coded TLS Certificate



Use of hard-coded TLS certificate by default allows an attacker to perform Man-in-the-Middle (MitM) attacks even in the presence of the HTTPS connection.


An un-authenticated remote attacker would be able to perform Man-in-the-Middle (MitM) attacks against users, breaking the confidentiality and integrity of the data exchanged via HTTPS.

Issue Date

October 21, 2022


The vulnerability affects: Lanner Inc IAC-AST2500A standard firmware version 1.00.0

CVE Name


CVSS Details


CVSS Score



Updated BMC firmware versions that fix the issue are available from Lanner technical support


Andrea Palanca of Nozomi Networks

Threat Intelligence

Curated and maintained by Nozomi Networks Labs, the Threat Intelligence™ service provides threat and vulnerability updates to Guardian, making it easy for IT/OT professionals to stay on top of current OT and IoT risks.

Threat actors love finding new ways to attack critical infrastructure. We love finding new ways to detect their malware before damage occurs.

Let's get started

Discover how easy it is to anticipate, diagnose and respond to cyber threats and process issues before they impact your operations.