An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-01-21T18:17:39

Updated: 2022-01-21T18:17:39

Reserved: 2021-11-30T00:00:00


Link: CVE-2021-23207

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-01-21T19:15:08.063

Modified: 2022-08-30T16:08:32.223


Link: CVE-2021-23207

JSON object: View

cve-icon Redhat Information

No data.