SB2021100106 - Multiple vulnerabilities in Boston Scientific Zoom Latitude



SB2021100106 - Multiple vulnerabilities in Boston Scientific Zoom Latitude

Published: October 1, 2021

Security Bulletin ID SB2021100106
Severity
Low
Patch available
NO
Number of vulnerabilities 5
Exploitation vector Physical access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Use of Password Hash With Insufficient Computational Effort (CVE-ID: CVE-2021-38400)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to use of password hash with insufficient computational effort. An attacker with physical access can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password. 


2) Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques (CVE-ID: CVE-2021-38394)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to missing protection against hardware reverse engineering using integrated circuit (IC) imaging techniques. An attacker with physical access can extract the binary that checks for the hardware key and reverse engineer it and use it to create a physical duplicate of a valid hardware key.


3) Improper access control (CVE-ID: CVE-2021-38392)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can gain access to the hard disk drive of the device to change the telemetry region and can use this setting to interrogate or program an implantable device in any region in the world.


4) Improper validation of integrity check value (CVE-ID: CVE-2021-38396)

The vulnerability allows a local attacker to bypass integrity checks.

The vulnerability exists due to the programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker with physical access can install unauthorized software using a specially crafted USB.


5) Reliance on Component That is Not Updateable (CVE-ID: CVE-2021-38398)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the affected device uses off-the-shelf software components that contain unpatched vulnerabilities. An attacker with physical access can exploit these vulnerabilities.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.