Fresenius-kabi

Vigilant Insight

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 21.01.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:09:41

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonat...

  • EPSS 0.17%
  • Veröffentlicht 21.01.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:09:41

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as ste...

  • EPSS 0.05%
  • Veröffentlicht 21.01.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:26:51

Fresenius Kabi Agilia Link + version 3.0 does not enforce transport layer encryption. Therefore, transmitted data may be sent in cleartext. Transport layer encryption is offered on Port TCP/443, but the affected service does not perform an automated ...

  • EPSS 0.22%
  • Veröffentlicht 21.01.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:07

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 allows user input to be validated on the client side without authentication by the server. The server should not rely on the correctness of the data because users might not ...

  • EPSS 0.18%
  • Veröffentlicht 21.01.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:01

Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 contains service credentials likely to be common across all instances. An attacker in possession of the password may gain privileges on all installations of this software.

  • EPSS 0.26%
  • Veröffentlicht 21.01.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:21

The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.

  • EPSS 0.05%
  • Veröffentlicht 21.01.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:22

An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate Rab...

  • EPSS 0.32%
  • Veröffentlicht 21.01.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:24

Sensitive endpoints in Fresenius Kabi Agilia Link+ v3.0 and prior can be accessed without any authentication information such as the session cookie. An attacker can send requests to sensitive endpoints as an unauthenticated user to perform critical a...

  • EPSS 0.21%
  • Veröffentlicht 21.01.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:25

Requests may be used to interrupt the normal operation of the device. When exploited, Fresenius Kabi Agilia Link+ version 3.0 must be rebooted via a hard reset triggered by pressing a button on the rack system.

  • EPSS 0.09%
  • Veröffentlicht 21.01.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:55

The SSL/TLS configuration of Fresenius Kabi Agilia Link + version 3.0 has serious deficiencies that may allow an attacker to compromise SSL/TLS sessions in different ways. An attacker may be able to eavesdrop on transferred data, manipulate data alle...