CVE-2021-23236

Requests may be used to interrupt the normal operation of the device. When exploited, Fresenius Kabi Agilia Link+ version 3.0 must be rebooted via a hard reset triggered by pressing a button on the rack system.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:fresenius-kabi:agilia_connect_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:-:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:d15:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:link\+_agilia:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 - Third Party Advisory, US Government Resource

Information

Published : 2022-01-21 19:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23236

Mitre link : CVE-2021-23236

CVE.ORG link : CVE-2021-23236


JSON object : View

Products Affected

fresenius-kabi

  • vigilant_centerium
  • agilia_partner_maintenance_software
  • vigilant_insight
  • link\+_agilia
  • vigilant_mastermed
  • agilia_connect_firmware
  • link\+_agilia_firmware
  • agilia_connect
CWE
CWE-400

Uncontrolled Resource Consumption