SB2022090213 - Multiple vulnerabilities in Contec Health CMS8000 



SB2022090213 - Multiple vulnerabilities in Contec Health CMS8000

Published: September 2, 2022

Security Bulletin ID SB2022090213
Severity
Medium
Patch available
NO
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2022-36385)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can plug in a USB drive, perform a malicious firmware update and load arbitrary firmware on the target device.


2) Resource exhaustion (CVE-ID: CVE-2022-38100)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


3) Use of hard-coded credentials (CVE-ID: CVE-2022-38069)

The vulnerability allows a local attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. An attacker with physical access can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Active Debug Code (CVE-ID: CVE-2022-38453)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to multiple binary application files are compiled with "not stripped" and "debug_info" compilation settings. A local administrator can reverse engineer sensitive code and identify additional vulnerabilities.


5) Improper access control (CVE-ID: CVE-2022-3027)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the SSID name of a new Wi-Fi access point. A remote attacker on the local network can use an SSID with a malicious name and write arbitrary files or display incorrect information.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.