iMonitor EAM 9.6394 transmits communication between the EAM client agent and the EAM server, as well as between the EAM monitor management software and the server, in plaintext without authentication or encryption. An attacker with network access can intercept sensitive information (such as credentials, keylogger data, and personally identifiable information) and tamper with traffic. This allows both unauthorized disclosure and modification of data, including issuing arbitrary commands to client agents.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://r.sec-consult.com/imonitor |
![]() ![]() |
History
Mon, 29 Sep 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Imonitor
Imonitor imonitor Eam |
|
Vendors & Products |
Imonitor
Imonitor imonitor Eam |
Thu, 25 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | iMonitor EAM 9.6394 transmits communication between the EAM client agent and the EAM server, as well as between the EAM monitor management software and the server, in plaintext without authentication or encryption. An attacker with network access can intercept sensitive information (such as credentials, keylogger data, and personally identifiable information) and tamper with traffic. This allows both unauthorized disclosure and modification of data, including issuing arbitrary commands to client agents. | |
Title | Unencrypted and Unauthenticated Communication Allows Data Exposure and Manipulation in iMonitor EAM | |
Weaknesses | CWE-319 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-09-25T18:56:01.197Z
Reserved: 2025-09-16T07:44:29.591Z
Link: CVE-2025-10540

Updated: 2025-09-25T18:55:57.361Z

Status : Awaiting Analysis
Published: 2025-09-25T14:15:42.203
Modified: 2025-09-26T14:32:53.583
Link: CVE-2025-10540

No data.