Use of Default Cryptographic Key vulnerability in Baxter Welch Allyn Connex Spot Monitor may allow Configuration/Environment Manipulation.This issue affects Welch Allyn Connex Spot Monitor in all versions prior to 1.52.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-17036 Use of Default Cryptographic Key vulnerability in Baxter Welch Allyn Connex Spot Monitor may allow Configuration/Environment Manipulation.This issue affects Welch Allyn Connex Spot Monitor in all versions prior to 1.52.
Fixes

Solution

Baxter has released a software update for all impacted devices and software to address this vulnerability. A new version of the product that mitigates the vulnerability is available as follows: * Welch Allyn Connex Spot Monitor: Version 1.52.01 (available October 16, 2023) Baxter recommends users upgrade to the latest versions of their products. Information on how to update products to their new versions can be found on the Baxter disclosure page https://www.baxter.com/product-security  or the Hillrom disclosure page https://www.hillrom.com/en/responsible-disclosures/ . Baxter recommends the following workarounds to help reduce risk: * Apply proper network and physical security controls. * Ensure a unique encryption key is configured and applied to the product (as described in the Connex Spot Monitor Service Manual).


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00115}

epss

{'score': 0.00192}


cve-icon MITRE

Status: PUBLISHED

Assigner: Baxter

Published:

Updated: 2024-08-01T18:33:25.355Z

Reserved: 2024-02-06T14:20:33.446Z

Link: CVE-2024-1275

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.355Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-31T18:15:10.140

Modified: 2024-11-21T08:50:12.913

Link: CVE-2024-1275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.