We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-33843

Fresenius Kabi Agilia Connect Infusion System files or directories accessible to external parties



Description

Fresenius Kabi Agilia SP MC WiFi vD25 and prior has a default configuration page accessible without authentication. An attacker may use this functionality to change the exposed configuration values such as network settings.

Reserved 2021-11-30 | Published 2022-01-21 | Updated 2024-08-03 | Assigner icscert


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-552 Files or Directories Accessible to External Parties

Product status

Any version before D25
affected

Credits

Julian Suleder (ERNW Research GmbH), Nils Emmerich (ERNW Research GmbH), Raphael Pavlidis (ERNW Research GmbH), and Dr. Oliver Matula (ERNW Enno Rey Netzwerke GmbH) reported these vulnerabilities to the German Federal Office for Information Security (BSI) in the context of the BSI project ManiMed (Medical Device Manipulation Project).

References

www.cisa.gov/uscert/ics/advisories/icsma-21-355-01

cve.org (CVE-2021-33843)

nvd.nist.gov (CVE-2021-33843)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-33843

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.