Critical Infrastructure Sectors: Healthcare and Public Health
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fresenius-kabi agilia_connect |
||
fresenius-kabi vigilant centerium 1.0 |
||
fresenius-kabi vigilant mastermed 1.0 |
||
fresenius-kabi vigilant insight 1.0 |
||
fresenius-kabi agilia partner maintenance software |
||
fresenius-kabi link\\+_agilia_firmware 3.0 |
||
fresenius-kabi link\\+_agilia_firmware |