Summary
An unauthenticated remote attacker could reset the administrator's password with information from the default, self-signed certificate.
Impact
An unathenticated attacker can remotely reset the administrator password.
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| QHA210 | QHA210 | moneo appliance <=1.9.3 |
| moneo appliance <=1.9.3 | moneo appliance <=1.9.3 |
Vulnerabilities
Expand / Collapse allMitigation
The certificate is renewed by adjusting the hostname to an own customer-specific, so it does not contain the serial number.
Remediation
The password-reset mechanism will be updated in a future version.
When using automation components, make sure that no unauthorized access can take place. In addition, measures should be taken to ensure that the components do not have direct access to Internet resources and that they cannot be accessed from insecure networks. Use available security measures such as authentication and authorization groups.
Acknowledgments
ifm electronic GmbH thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
- Aimon Dawson for reporting
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 12/12/2022 12:00 | Initial revision. |
| 2.0.0 | 01/06/2026 12:00 | fixed version range, added Hardware with relationship, changed vulnerability title to CVE description |