CVE-2021-23207

EUVD-2021-10312
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
icscertCNA
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
Affected Products (NVD)
VendorProductVersion
fresenius-kabiagilia_partner_maintenance_software
𝑥
≤ 3.3.0
fresenius-kabivigilant_centerium
1.0
fresenius-kabivigilant_insight
1.0
fresenius-kabivigilant_mastermed
1.0
fresenius-kabilink\+_agilia_firmware
𝑥
< 3.0
fresenius-kabilink\+_agilia_firmware
3.0
fresenius-kabilink\+_agilia_firmware
3.0:d15
𝑥
= Vulnerable software versions