Hospira MedNet before 6.1 uses a hardcoded cleartext password to control SQL database authorization, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-5293 Hospira MedNet before 6.1 uses a hardcoded cleartext password to control SQL database authorization, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
Fixes

Solution

Hospira has developed a new version of the MedNet software, MedNet 6.1. Hospira reports that MedNet 6.1 no longer uses hard-coded passwords, hard-coded cryptographic keys, and no longer stores passwords in clear text. Existing versions of MedNet can be upgraded to MedNet 6.1. Hospira has produced mitigation recommendations that help mitigate the vulnerability in the vulnerable version of JBoss Enterprise Application Platform software, used in the MedNet software. This has been addressed by Hospira through issuance of the following knowledge based articles: Improving Security in Hospira MedNet 5.5 (August 2014) and Improving Security in Hospira MedNet 5.8 (August 2014). For additional information about Hospira’s new releases and mitigation recommendations, contact Hospira’s technical support at 1-800-241-4002.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
Title Hospira MedNet Use of Hard-coded Password
Weaknesses CWE-259
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-03T18:25:50.764Z

Reserved: 2014-08-22T00:00:00

Link: CVE-2014-5405

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-04-03T10:59:02.290

Modified: 2025-11-03T19:15:38.370

Link: CVE-2014-5405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.