Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-4228
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Hard-coded TLS Certificate
Source: NVD (National Vulnerability Database)
Vulnerability Description
Use of hard-coded TLS certificate by default allows an attacker to perform Man-in-the-Middle (MitM) attacks even in the presence of the HTTPS connection. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.00.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用硬编码的密码学密钥
Source: NVD (National Vulnerability Database)
Vulnerability Title
Lanner IAC-AST2500A 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Lanner IAC-AST2500A是中国立端(Lanner)公司的一个模块和加速卡。适合 Lanner 网络设备,以支持基于 IPMI 标准的系统运行状况远程管理和监控。 Lanner IAC-AST2500A standard firmware 1.00.0版本存在信任管理问题漏洞,该漏洞源于其默认情况下使用硬编码TLS证书允许攻击者执行中间人攻击(即使存在HTTPS连接)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Lanner IncIAC-AST2500A 1.00.0 -
II. Public POCs for CVE-2021-4228
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-4228
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2021-4228

No comments yet


Leave a comment