We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-33843

Fresenius Kabi Agilia Connect Infusion System files or directories accessible to external parties



Assignericscert
Reserved2021-11-30
Published2022-01-21
Updated2024-08-03

Description

Fresenius Kabi Agilia SP MC WiFi vD25 and prior has a default configuration page accessible without authentication. An attacker may use this functionality to change the exposed configuration values such as network settings.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Product status

Any version before D25
affected

Credits

Julian Suleder (ERNW Research GmbH), Nils Emmerich (ERNW Research GmbH), Raphael Pavlidis (ERNW Research GmbH), and Dr. Oliver Matula (ERNW Enno Rey Netzwerke GmbH) reported these vulnerabilities to the German Federal Office for Information Security (BSI) in the context of the BSI project ManiMed (Medical Device Manipulation Project).

References

https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01

cve.org CVE-2021-33843

nvd.nist.gov CVE-2021-33843

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-33843
Subscribe to our newsletter to learn more about our work.