Armis Logo< Back

CVE-2025-0683:

Vulnerability in Contec Health CMS8000 Patient Monitor where, in default configuration, it transmits plain-text patient data to a hard-coded public IP address, potentially exposing confidential information to unauthorized actors or during MITM interception.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

5.9Medium
  • Published Date:Jan 30, 2025
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Threat Predictions

  • EPSS Score:0.2
  • EPSS Percentile:36%

Exploitability

  • Score:2.2
  • Attack Vector:NETWORK
  • Attack Complexity:HIGH
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:3.6
  • Confidentiality Impact:HIGH
  • Integrity Impact:NONE
  • Availability Impact:NONE

Description Preview

Vulnerability in Contec Health CMS8000 Patient Monitor where, in default configuration, it transmits plain-text patient data to a hard-coded public IP address, potentially exposing confidential information to unauthorized actors or during MITM interception.

Overview

This CVE describes a network-exposed data disclosure vulnerability in the Contec Health CMS8000 Patient Monitor. When a patient is connected, the device sends unencrypted patient data to a hard-coded public IP, enabling potential data leakage to anyone who can reach that IP or to an attacker conducting a man-in-the-middle on the network. The issue requires no user interaction and does not grant privileges, placing patient confidentiality at risk across all versions. Regulatory bodies have issued advisories urging immediate action, including removing such devices from networks and reviewing device labeling to identify re-labeled units.

Remediation

  • Immediately remove any Contec CMS8000 devices from networks per FDA guidance and related CISA advisories.
  • If the device must remain temporarily online, isolate it on a segregated network with strict access controls and monitor all outbound traffic, especially connections to the hard-coded IP.
  • Review FDA safety communications and CISA advisories for current mitigations and guidance; verify whether devices are re-labeled and identify affected inventory.
  • Engage with the vendor (Contec Health) for any available mitigations, firmware updates, or recommended configuration changes; document any vendor guidance and planned decommissioning.
  • Plan for replacement with more secure devices and implement network segmentation and ongoing security monitoring to limit exposure from any legacy devices.
  • Update incident response and risk management documentation; ensure clinical staff are informed about the risk and containment steps.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!