Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-39098 | A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device. |
Solution
No solution given by the vendor.
Workaround
Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information. The following mitigations could assist in reducing the risk for exploitation of vulnerabilities: Disabling UART functionality at the CPU level Enforcing unique device authentication before granting access to the terminal / bootloader Where possible, enforcing secure boot. Tamper stickers on the device casing to indicate when a device has been opened
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01 |
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:47:37.455Z
Reserved: 2022-08-29T00:00:00.000Z
Link: CVE-2022-36385
Updated: 2024-08-03T10:00:04.453Z
Status : Modified
Published: 2022-09-13T15:15:08.480
Modified: 2024-11-21T07:12:55.063
Link: CVE-2022-36385
No data.
OpenCVE Enrichment
No data.
EUVD