Insufficiently Protected Credentials vulnerability in Baxter Welch Allyn Configuration Tool may allow Remote Services with Stolen Credentials.This issue affects Welch Allyn Configuration Tool: versions 1.9.4.1 and prior.
Fixes

Solution

Baxter has found no evidence to date of any compromise of personal or health data. Baxter will release a software update for all impacted software to address this vulnerability. A new version of the product that mitigates the vulnerability will be available as follows: * Welch Allyn Product Configuration Tool versions 1.9.4.2: Available Q3 2024 * No user action will be required once the update is released. Baxter recommends the following workarounds to help reduce risk: * Apply proper network and physical security controls. * The Welch Allyn Configuration Tool has been removed from public access. Customers are advised to contact Baxter Technical Support or their Baxter Project Manager to create configuration files, as needed. Baxter Technical Support can be reached at (800)535-6663, option 2.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00113}

epss

{'score': 0.00141}


cve-icon MITRE

Status: PUBLISHED

Assigner: Baxter

Published:

Updated: 2024-09-03T15:31:58.511Z

Reserved: 2024-05-21T16:07:59.038Z

Link: CVE-2024-5176

cve-icon Vulnrichment

Updated: 2024-08-01T21:03:11.030Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-31T18:15:13.280

Modified: 2024-11-21T09:47:07.943

Link: CVE-2024-5176

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.