An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-01-21T18:17:39
Updated: 2022-01-21T18:17:39
Reserved: 2021-11-30T00:00:00
Link: CVE-2021-23207
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-21T19:15:08.063
Modified: 2022-08-30T16:08:32.223
Link: CVE-2021-23207
JSON object: View
Redhat Information
No data.