Multiple vulnerabilities in Hillrom Medical Device Management



Published: 2021-06-02
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-27410
CVE-2021-27408
CWE-ID CWE-787
CWE-125
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Welch Allyn Service Tool
Hardware solutions / Firmware

Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE)
Hardware solutions / Firmware

Welch Allyn Software Development Kit (SDK)
Hardware solutions / Firmware

Welch Allyn Connex Central Station (CS)
Hardware solutions / Firmware

Welch Allyn Service Monitor
Hardware solutions / Firmware

Welch Allyn Connex Vital Signs Monitor (CVSM)
Hardware solutions / Firmware

Welch Allyn Connex Integrated Wall System (CIWS)
Hardware solutions / Firmware

Welch Allyn Connex Spot Monitor (CSM)
Hardware solutions / Firmware

Welch Allyn Spot Vital Signs 4400 Device (Spot 4400)
Hardware solutions / Firmware

Welch Allyn Spot 4400 Vital Signs Extended Care Device
Hardware solutions / Firmware

Vendor

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU53730

Risk: Medium

CVSSv3.1: 6.2 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-27410

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input. A remote authenticated attacker on the local network can trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Welch Allyn Service Tool: before 1.10

Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE): before 5.3

Welch Allyn Software Development Kit (SDK): before 3.2

Welch Allyn Connex Central Station (CS): before 1.8.6

Welch Allyn Service Monitor: before 1.7.0.0

Welch Allyn Connex Vital Signs Monitor (CVSM): before 2.43.02

Welch Allyn Connex Integrated Wall System (CIWS): before 2.43.02

Welch Allyn Connex Spot Monitor (CSM): before 1.52

Welch Allyn Spot Vital Signs 4400 Device (Spot 4400): before 1.11.00

Welch Allyn Spot 4400 Vital Signs Extended Care Device: before 1.11.00

External links

http://ics-cert.us-cert.gov/advisories/icsma-21-152-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU53731

Risk: Medium

CVSSv3.1: 4.2 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-27408

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote authenticated attacker on the local network can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Welch Allyn Service Tool: before 1.10

Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE): before 5.3

Welch Allyn Software Development Kit (SDK): before 3.2

Welch Allyn Connex Central Station (CS): before 1.8.6

Welch Allyn Service Monitor: before 1.7.0.0

Welch Allyn Connex Vital Signs Monitor (CVSM): before 2.43.02

Welch Allyn Connex Integrated Wall System (CIWS): before 2.43.02

Welch Allyn Connex Spot Monitor (CSM): before 1.52

Welch Allyn Spot Vital Signs 4400 Device (Spot 4400): before 1.11.00

Welch Allyn Spot 4400 Vital Signs Extended Care Device: before 1.11.00

External links

http://ics-cert.us-cert.gov/advisories/icsma-21-152-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###