CVE-2021-37165:
Buffer overflow vulnerability in Swisslog Healthcare Nexus Panel HMI3 Control Panel allows remote code execution.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Aug 2, 2021
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:5.0
- EPSS Percentile:90%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Buffer overflow vulnerability in Swisslog Healthcare Nexus Panel HMI3 Control Panel allows remote code execution.
Overview
The vulnerability exists in the message processing functionality of the HMI3 Control Panel in Swisslog Healthcare's Nexus Panel system. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through a queue mechanism called pendingQ. Due to improper input validation and buffer management, this process can trigger a buffer overflow condition. An attacker who successfully exploits this vulnerability could potentially execute arbitrary code with the privileges of the application, potentially leading to complete system compromise. This vulnerability is particularly concerning as these systems are commonly deployed in healthcare environments, where disruption could impact patient care.
Remediation
- To address this vulnerability, organizations should:
- 1. Update to Nexus Software version 7.2.5.7 or later, which contains patches for this vulnerability.
- 2. If immediate patching is not possible, implement network segmentation to restrict access to the affected systems.
- 3. Monitor network traffic to and from the Nexus Panel systems for suspicious activity.
- 4. Contact Swisslog Healthcare technical support for guidance specific to your deployment.
- 5. Implement the principle of least privilege for all systems and users that interact with the Nexus Panel.
- 6. Consider implementing additional network security controls such as firewalls and intrusion detection systems to protect vulnerable systems.
References
- 1. Armis Security "PwnedPiper" Research: https://www.armis.com/PwnedPiper
- 2. Swisslog Healthcare Product Information: https://www.swisslog-healthcare.com
- 3. Swisslog Healthcare CVE Disclosures: https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures
- 4. CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.