Sensitive endpoints in Fresenius Kabi Agilia Link+ v3.0 and prior can be accessed without any authentication information such as the session cookie. An attacker can send requests to sensitive endpoints as an unauthenticated user to perform critical actions or modify critical configuration parameters.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-10333 Sensitive endpoints in Fresenius Kabi Agilia Link+ v3.0 and prior can be accessed without any authentication information such as the session cookie. An attacker can send requests to sensitive endpoints as an unauthenticated user to perform critical actions or modify critical configuration parameters.
Fixes

Solution

Fresenius Kabi has created new versions to address these vulnerabilities: • Link+ v3.0 (D16 or later) • VSS v1.0.3 (or later) • Agilia Connect Pumps Wifi Module (D29 or later) • Agilia Connect Partner v3.3.2 (or later) Fresenius Kabi has initiated communication on this topic in April 2021 with customers to inform them about availability of the new versions in corresponding countries. Contact Fresenius Kabi online or by phone at 1-800-333-6925 for more information on updating to the newest version. Fresenius Kabi also identified that early Link+ devices (approximatively 1200 devices) would need hardware change to support D16 or later firmware. Until those devices can be replaced in customers’ installation, Fresenius Kabi recommends users to rely on CISA recommendation.


Workaround

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. • Locate control system networks and remote devices behind firewalls and isolate them from the business network. • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:47:50.571Z

Reserved: 2021-11-30T00:00:00.000Z

Link: CVE-2021-23233

cve-icon Vulnrichment

Updated: 2024-08-03T19:05:53.889Z

cve-icon NVD

Status : Modified

Published: 2022-01-21T19:15:08.123

Modified: 2024-11-21T05:51:24.783

Link: CVE-2021-23233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.