SB2021080306 - Multiple vulnerabilities in Swisslog Healthcare HMI3 Control Panel and Nexus Panel



SB2021080306 - Multiple vulnerabilities in Swisslog Healthcare HMI3 Control Panel and Nexus Panel

Published: August 3, 2021

Security Bulletin ID SB2021080306
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Download of code without integrity check (CVE-ID: CVE-2021-37160)

The vulnerability allows a remote attacker to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading updates. A remote attacker can supply a malicious file and gain full control over the affected system after a successful software update.


2) Execution with unnecessary privileges (CVE-ID: CVE-2021-37167)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application binary has a setuid bit. A remote attacker can run the affected binary and execute arbitrary code on the system with root privileges.


3) Improper access control (CVE-ID: CVE-2021-37166)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.


4) Buffer overflow (CVE-ID: CVE-2021-37165)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "hmiProcessMsg" function. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Stack-based buffer overflow (CVE-ID: CVE-2021-37164)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the tcpTxThread function. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Use of hard-coded credentials (CVE-ID: CVE-2021-37163)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Heap-based buffer overflow (CVE-ID: CVE-2021-37162)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can send a specially crafted UDP message, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Heap-based buffer overflow (CVE-ID: CVE-2021-37161)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

References