Learn about CVE-2021-23207 involving the plaintext storage vulnerability in Fresenius Kabi's Agilia Connect Infusion System, its impact, technical details, affected systems, exploitation, and mitigation steps.
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
Understanding CVE-2021-23207
This CVE involves plaintext storage of a password in the Fresenius Kabi Agilia Connect Infusion System, leading to potential security risks.
What is CVE-2021-23207?
CVE-2021-23207 allows an attacker with physical access to the host to extract secrets from the registry, creating valid JWT tokens and manipulating RabbitMQ queues.
The Impact of CVE-2021-23207
The vulnerability poses a medium-severity threat with high confidentiality impact, enabling attackers to impersonate users and perform unauthorized actions.
Technical Details of CVE-2021-23207
The vulnerability has a CVSS base score of 6.5, with low complexity and a local attack vector. It requires low privileges and has a scope of changed data.
Vulnerability Description
The flaw enables attackers to extract secrets and impersonate users, potentially leading to unauthorized access.
Affected Systems and Versions
Fresenius Kabi's Vigilant Software Suite (Mastermed Dashboard) versions less than 2.0.1.3 and Agilia Partner versions less than 3.0 are impacted.
Exploitation Mechanism
Attackers can exploit the plaintext storage of a password to create valid tokens and manipulate system components.
Mitigation and Prevention
To address CVE-2021-23207, Fresenius Kabi has released updated versions and provided recommendations for users.
Immediate Steps to Take
Users are advised to minimize network exposure for control system devices, segregate networks, and use secure remote access methods.
Long-Term Security Practices
Implement firewall protection, update VPNs regularly, and secure network environments to prevent unauthorized access.
Patching and Updates
Fresenius Kabi offers new versions for affected products and recommends contacting them for assistance in updating to the latest secure versions.