Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-10335 | Requests may be used to interrupt the normal operation of the device. When exploited, Fresenius Kabi Agilia Link+ version 3.0 must be rebooted via a hard reset triggered by pressing a button on the rack system. |
Solution
Fresenius Kabi has created new versions to address these vulnerabilities: • Link+ v3.0 (D16 or later) • VSS v1.0.3 (or later) • Agilia Connect Pumps Wifi Module (D29 or later) • Agilia Connect Partner v3.3.2 (or later) Fresenius Kabi has initiated communication on this topic in April 2021 with customers to inform them about availability of the new versions in corresponding countries. Contact Fresenius Kabi online or by phone at 1-800-333-6925 for more information on updating to the newest version. Fresenius Kabi also identified that early Link+ devices (approximatively 1200 devices) would need hardware change to support D16 or later firmware. Until those devices can be replaced in customers’ installation, Fresenius Kabi recommends users to rely on CISA recommendation.
Workaround
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. • Locate control system networks and remote devices behind firewalls and isolate them from the business network. • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 |
![]() ![]() |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:48:05.390Z
Reserved: 2021-11-30T00:00:00.000Z
Link: CVE-2021-23236

Updated: 2024-08-03T19:05:55.456Z

Status : Modified
Published: 2022-01-21T19:15:08.177
Modified: 2024-11-21T05:51:25.647
Link: CVE-2021-23236

No data.

No data.