
Summary
Use of hard-coded TLS certificate by default allows an attacker to perform Man-in-the-Middle (MitM) attacks even in the presence of the HTTPS connection.
Impact
An un-authenticated remote attacker would be able to perform Man-in-the-Middle (MitM) attacks against users, breaking the confidentiality and integrity of the data exchanged via HTTPS.
Issue Date
October 21, 2022
Affects
The vulnerability affects: Lanner Inc IAC-AST2500A standard firmware version 1.00.0
CVE Name
CVE-2021-4228
CVSS Details
CVSS Score
5.8
Solution
Updated BMC firmware versions that fix the issue are available from Lanner technical support
Acknowledgments
Andrea Palanca of Nozomi Networks
Threat Intelligence
Curated and maintained by Nozomi Networks Labs, the Threat Intelligence™ service provides threat and vulnerability updates to Guardian, making it easy for IT/OT professionals to stay on top of current OT and IoT risks.

Threat actors love finding new ways to attack critical infrastructure. We love finding new ways to detect their malware before damage occurs.
Andrea Carcano & MorenoCarullo
Co-founders, Nozomi Networks
Let's get started
Discover how easy it is to anticipate, diagnose and respond to cyber threats and process issues before they impact your operations.