Discover the impact of CVE-2021-23236 affecting Fresenius Kabi's Agilia Link+ infusion system. Learn about the vulnerability, technical details, mitigation steps, and prevention measures.
Fresenius Kabi's Agilia Link+ infusion system is affected by a vulnerability that allows interruption of normal operation, requiring a reboot. The impact is rated high with a CVSS base score of 7.5.
Understanding CVE-2021-23236
This CVE describes a vulnerability in the Agilia Link+ infusion system by Fresenius Kabi due to uncontrolled resource consumption.
What is CVE-2021-23236?
The CVE-2021-23236 vulnerability allows requests to interrupt the normal operation of the device, necessitating a hard reset of the Agilia Link+ version 3.0 infusion system.
The Impact of CVE-2021-23236
The vulnerability has a high impact, with an availability impact rating of HIGH and a CVSS base score of 7.5, posing a risk to the device's functionality.
Technical Details of CVE-2021-23236
The vulnerability is identified with a CVSS v3.1 base score of 7.5, signifying a HIGH severity issue with low attack complexity and network-based attack vector.
Vulnerability Description
Requests can disrupt device functionality, necessitating a hard reset of the affected Agilia Link+ version 3.0 infusion system.
Affected Systems and Versions
The vulnerability impacts the Agilia Link+ by Fresenius Kabi with versions less than 3.0, specifically affecting custom versions.
Exploitation Mechanism
Exploitation can be performed through malicious requests that disrupt device operation, requiring a manual hard reset.
Mitigation and Prevention
To address CVE-2021-23236, Fresenius Kabi has released updated versions of the affected systems to mitigate the vulnerability.
Immediate Steps to Take
Users are advised to update to the latest versions of the Agilia Link+ system and related components as provided by Fresenius Kabi.
Long-Term Security Practices
Implement network segmentation, restrict access to control systems, and follow security best practices to reduce exposure and mitigate risks.
Patching and Updates
Regularly apply security patches and updates provided by the vendor to protect systems from known vulnerabilities.