No analysis available yet.
Vendor Solution
Baxter has found no evidence to date of any compromise of personal or health data. Baxter will release a software update for all impacted software to address this vulnerability. A new version of the product that mitigates the vulnerability will be available as follows: * Welch Allyn Product Configuration Tool versions 1.9.4.2: Available Q3 2024 * No user action will be required once the update is released. Baxter recommends the following workarounds to help reduce risk: * Apply proper network and physical security controls. * The Welch Allyn Configuration Tool has been removed from public access. Customers are advised to contact Baxter Technical Support or their Baxter Project Manager to create configuration files, as needed. Baxter Technical Support can be reached at (800)535-6663, option 2.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46423 | Insufficiently Protected Credentials vulnerability in Baxter Welch Allyn Configuration Tool may allow Remote Services with Stolen Credentials.This issue affects Welch Allyn Configuration Tool: versions 1.9.4.1 and prior. |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Baxter
Published:
Updated: 2024-09-03T15:31:58.511Z
Reserved: 2024-05-21T16:07:59.038Z
Link: CVE-2024-5176
Updated: 2024-08-01T21:03:11.030Z
Status : Deferred
Published: 2024-05-31T18:15:13.280
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5176
No data.
OpenCVE Enrichment
No data.
EUVD