6.4
CVSSv2

CVE-2017-11693

Published: 28/07/2017 Updated: 15/08/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

MEDHOST Document Management System contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the database may be able to obtain or modify sensitive patient and financial information. PostgreSQL is used as the Document Management System database. The account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for PostgreSQL has access to the database schema for Document Management System.

Vulnerable Product Search on Vulmon Subscribe to Product

medhost medhost document management system -

Exploits

MEDHOST Document Management System contains hard-coded credentials used for customer database and Apache Solr access ...
MEDHOST Connex contains a hard-coded Mirth Connect administrative credential that is used for customer Mirth Connect management access ...