Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 has the option for automated indexing (directory listing) activated. When accessing a directory, a web server delivers its entire content in HTML form. If an index file does not exist and directory listing is enabled, all content of the directory will be displayed, allowing an attacker to identify and access files on the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10301 Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 has the option for automated indexing (directory listing) activated. When accessing a directory, a web server delivers its entire content in HTML form. If an index file does not exist and directory listing is enabled, all content of the directory will be displayed, allowing an attacker to identify and access files on the server.
Fixes

Solution

Fresenius Kabi has created new versions to address these vulnerabilities: • Link+ v3.0 (D16 or later) • VSS v1.0.3 (or later) • Agilia Connect Pumps Wifi Module (D29 or later) • Agilia Connect Partner v3.3.2 (or later) Fresenius Kabi has initiated communication on this topic in April 2021 with customers to inform them about availability of the new versions in corresponding countries. Contact Fresenius Kabi online or by phone at 1-800-333-6925 for more information on updating to the newest version. Fresenius Kabi also identified that early Link+ devices (approximatively 1200 devices) would need hardware change to support D16 or later firmware. Until those devices can be replaced in customers’ installation, Fresenius Kabi recommends users to rely on CISA recommendation.


Workaround

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. • Locate control system networks and remote devices behind firewalls and isolate them from the business network. • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:47:42.124Z

Reserved: 2021-11-30T00:00:00.000Z

Link: CVE-2021-23195

cve-icon Vulnrichment

Updated: 2024-08-03T19:05:54.450Z

cve-icon NVD

Status : Modified

Published: 2022-01-21T19:15:07.950

Modified: 2024-11-21T05:51:21.363

Link: CVE-2021-23195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.