- Description
- Hospira MedNet before 6.1 uses a hardcoded cleartext password to control SQL database authorization, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-200
- Hype score
- Not currently trending
- Comment
- -
- Impact
- Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03: “The MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.” Based on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link).
- Solution
- Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03: “The MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.” Based on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link).
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hospira:mednet:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "891CFD8D-5C12-4A8E-AEA1-928165D0B56B",
"versionEndIncluding": "5.8"
}
],
"operator": "OR"
}
]
}
]