iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.
History

Mon, 29 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Imonitor
Imonitor imonitor Eam
Vendors & Products Imonitor
Imonitor imonitor Eam

Thu, 25 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 25 Sep 2025 14:45:00 +0000

Type Values Removed Values Added
Description iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.
Title Insecure Default Admin Credentials Enable Full Administrative Access in iMonitor EAM
Weaknesses CWE-1392
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2025-09-25T14:35:18.879Z

Updated: 2025-09-25T18:24:22.849Z

Reserved: 2025-09-16T07:44:52.501Z

Link: CVE-2025-10542

cve-icon Vulnrichment

Updated: 2025-09-25T18:24:12.983Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-25T15:16:09.487

Modified: 2025-09-26T14:32:53.583

Link: CVE-2025-10542

cve-icon Redhat

No data.