In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilized hard coded SMB credentials, which may allow an attacker to remotely execute arbitrary code.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-023-01 | Third Party Advisory US Government Resource |
https://www3.gehealthcare.com/~/media/downloads/us/support/site-planning/site-readiness/gehc-gateway_project_implementation_guide_pdf.pdf | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2020-01-24 17:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-6963
Mitre link : CVE-2020-6963
CVE.ORG link : CVE-2020-6963
JSON object : View
Products Affected
gehealthcare
- clinical_information_center_mp100d
- clinical_information_center_mp100r_firmware
- clinical_information_center_mp100r
- apexpro_telemetry_server
- clinical_information_center_mp100d_firmware
- carescape_central_station_mai700_firmware
- carescape_telemetry_server_mp100r_firmware
- carescape_telemetry_server_mp100r
- carescape_central_station_mas700
- apexpro_telemetry_server_firmware
- carescape_central_station_mai700
- carescape_central_station_mas700_firmware