GE Healthcare Discovery XR656 and XR656 G2 has a password of (1) 2getin for the insite user, (2) 4$xray for the xruser user, and (3) #superxr for the root user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://apps.gehealthcare.com/servlet/ClientServlet/5643835-1EN_r1.pdf?REQ=RAA&DIRECTION=5643835-1EN&FILENAME=5643835-1EN_r1.pdf&FILEREV=1&DOCREV_ORG=1 - | |
References | () http://apps.gehealthcare.com/servlet/ClientServlet/IM-5343950-1EN.pdf?DOCCLASS=A&REQ=RAC&DIRECTION=5343950-1EN&FILENAME=IM-5343950-1EN.pdf&FILEREV=7&DOCREV_ORG=7&SUBMIT=+ACCEPT+ - | |
References | () http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/ - | |
References | () https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02 - | |
References | () https://twitter.com/digitalbond/status/619250429751222277 - |
Information
Published : 2015-08-04 14:59
Updated : 2024-11-21 02:16
NVD link : CVE-2014-7232
Mitre link : CVE-2014-7232
CVE.ORG link : CVE-2014-7232
JSON object : View
Products Affected
gehealthcare
- discovery_xr656
- discovery_xr656_g2
CWE
CWE-255
Credentials Management Errors