Overview
- Description
- Hospira MedNet before 6.1 uses a hardcoded cleartext password to control SQL database authorization, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-200
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- -
- Impact
- Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03: “The MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.” Based on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link).
- Solution
- Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03: “The MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.” Based on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link).
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hospira:mednet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "891CFD8D-5C12-4A8E-AEA1-928165D0B56B", "versionEndIncluding": "5.8" } ], "operator": "OR" } ] } ]