Description Preview
Overview
- Vulnerability Type: Remote Code Execution (RCE)
- Affected Product: NextGen Healthcare Mirth Connect
- Affected Versions: All versions prior to 4.4.1
- CWE Identifiers:
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-502: Deserialization of Untrusted Data
- CVSS v3.1 Score: 9.8 (Critical)
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Remediation
To mitigate the risk associated with CVE-2023-43208, users of NextGen Healthcare Mirth Connect should upgrade to version 4.4.1 or later. It is crucial to apply this update as soon as possible to protect against potential exploitation of this vulnerability. Additionally, organizations should review their security policies and practices to ensure that they are adequately protecting their systems against similar vulnerabilities in the future.
References
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Oct 26, 2023
- CISA KEV Date
- May 20, 2024
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance: Medium
- ManufacturingManufacturing: Low
- Public AdministrationPublic Administration: Low
- Educational ServicesEducational Services: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Finance and InsuranceFinance and Insurance: Low
- InformationInformation: Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- MiningMining: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low