Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-23207 : Vulnerability Insights and Analysis

Learn about CVE-2021-23207 involving the plaintext storage vulnerability in Fresenius Kabi's Agilia Connect Infusion System, its impact, technical details, affected systems, exploitation, and mitigation steps.

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.

Understanding CVE-2021-23207

This CVE involves plaintext storage of a password in the Fresenius Kabi Agilia Connect Infusion System, leading to potential security risks.

What is CVE-2021-23207?

CVE-2021-23207 allows an attacker with physical access to the host to extract secrets from the registry, creating valid JWT tokens and manipulating RabbitMQ queues.

The Impact of CVE-2021-23207

The vulnerability poses a medium-severity threat with high confidentiality impact, enabling attackers to impersonate users and perform unauthorized actions.

Technical Details of CVE-2021-23207

The vulnerability has a CVSS base score of 6.5, with low complexity and a local attack vector. It requires low privileges and has a scope of changed data.

Vulnerability Description

The flaw enables attackers to extract secrets and impersonate users, potentially leading to unauthorized access.

Affected Systems and Versions

Fresenius Kabi's Vigilant Software Suite (Mastermed Dashboard) versions less than 2.0.1.3 and Agilia Partner versions less than 3.0 are impacted.

Exploitation Mechanism

Attackers can exploit the plaintext storage of a password to create valid tokens and manipulate system components.

Mitigation and Prevention

To address CVE-2021-23207, Fresenius Kabi has released updated versions and provided recommendations for users.

Immediate Steps to Take

Users are advised to minimize network exposure for control system devices, segregate networks, and use secure remote access methods.

Long-Term Security Practices

Implement firewall protection, update VPNs regularly, and secure network environments to prevent unauthorized access.

Patching and Updates

Fresenius Kabi offers new versions for affected products and recommends contacting them for assistance in updating to the latest secure versions.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now