Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-5288 | The installation component in Hospira MedNet before 6.1 places cleartext credentials in configuration files, which allows local users to obtain sensitive information by reading a file. |
Solution
Hospira has developed a new version of the MedNet software, MedNet 6.1. Hospira reports that MedNet 6.1 no longer uses hard-coded passwords, hard-coded cryptographic keys, and no longer stores passwords in clear text. Existing versions of MedNet can be upgraded to MedNet 6.1. Hospira has produced mitigation recommendations that help mitigate the vulnerability in the vulnerable version of JBoss Enterprise Application Platform software, used in the MedNet software. This has been addressed by Hospira through issuance of the following knowledge based articles: Improving Security in Hospira MedNet 5.5 (August 2014) and Improving Security in Hospira MedNet 5.8 (August 2014). For additional information about Hospira’s new releases and mitigation recommendations, contact Hospira’s technical support at 1-800-241-4002.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-260 |
Mon, 03 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Hospira MedNet Password in Configuration File | |
| References |
| |
| Metrics |
cvssV2_0
|
cvssV2_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-03T18:26:56.284Z
Reserved: 2014-08-22T00:00:00
Link: CVE-2014-5400
No data.
Status : Deferred
Published: 2015-04-03T10:59:00.070
Modified: 2025-11-03T19:15:37.050
Link: CVE-2014-5400
No data.
OpenCVE Enrichment
No data.
EUVD