Early Access — Mondoo Vulnerability Intelligence is currently in preview.
A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
Exploitability
AV:NAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HOther