Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. If asset owners cannot remove the devices from their networks, users should block 202.114.4.0/24 from their networks, or block 202.114.4.119 and 202.114.4.120. Please note that this device may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA's safety communication https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication .
Sat, 01 Mar 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Contec Health CMS8000 Patient Monitor sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device. | The "monitor" binary in the firmware of the affected product attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function also enables the network interface of the device if it is disabled. The function is triggered by attempting to update the device from the user menu. This could serve as a backdoor to the device, and could lead to a malicious actor being able to upload and overwrite files on the device. |
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 31 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The affected product sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device. | Contec Health CMS8000 Patient Monitor sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device. |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 16:45:00 +0000
Thu, 30 Jan 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The affected product sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device. | |
Title | Hidden Functionality vulnerability in Contec Health CMS8000 Patient Monitor | |
Weaknesses | CWE-912 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-03-01T17:12:24.132Z
Reserved: 2025-01-21T17:29:48.728Z
Link: CVE-2025-0626

Updated: 2025-01-31T15:37:36.861Z

Status : Awaiting Analysis
Published: 2025-01-30T19:15:14.010
Modified: 2025-03-01T18:15:34.140
Link: CVE-2025-0626

No data.

No data.