Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-10333 | Sensitive endpoints in Fresenius Kabi Agilia Link+ v3.0 and prior can be accessed without any authentication information such as the session cookie. An attacker can send requests to sensitive endpoints as an unauthenticated user to perform critical actions or modify critical configuration parameters. |
Solution
Fresenius Kabi has created new versions to address these vulnerabilities: • Link+ v3.0 (D16 or later) • VSS v1.0.3 (or later) • Agilia Connect Pumps Wifi Module (D29 or later) • Agilia Connect Partner v3.3.2 (or later) Fresenius Kabi has initiated communication on this topic in April 2021 with customers to inform them about availability of the new versions in corresponding countries. Contact Fresenius Kabi online or by phone at 1-800-333-6925 for more information on updating to the newest version. Fresenius Kabi also identified that early Link+ devices (approximatively 1200 devices) would need hardware change to support D16 or later firmware. Until those devices can be replaced in customers’ installation, Fresenius Kabi recommends users to rely on CISA recommendation.
Workaround
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. • Locate control system networks and remote devices behind firewalls and isolate them from the business network. • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 |
![]() ![]() |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:47:50.571Z
Reserved: 2021-11-30T00:00:00.000Z
Link: CVE-2021-23233

Updated: 2024-08-03T19:05:53.889Z

Status : Modified
Published: 2022-01-21T19:15:08.123
Modified: 2024-11-21T05:51:24.783
Link: CVE-2021-23233

No data.

No data.