CVE-2021-23236

Requests may be used to interrupt the normal operation of the device. When exploited, Fresenius Kabi Agilia Link+ version 3.0 must be rebooted via a hard reset triggered by pressing a button on the rack system.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:fresenius-kabi:agilia_connect_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:-:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:d15:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:link\+_agilia:-:*:*:*:*:*:*:*

History

28 Jan 2022, 16:13

Type Values Removed Values Added
CPE cpe:2.3:a:fresnius-kabi:agilia_partner_maintenance:*:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_link\+:*:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_connect:*:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_link\+:3.0:d15:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:vigilant_software_suite:1.0:*:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:link\+_agilia:-:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:agilia_connect_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:d15:*:*:*:*:*:*
cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*
cpe:2.3:o:fresenius-kabi:link\+_agilia_firmware:3.0:-:*:*:*:*:*:*

27 Jan 2022, 19:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.8
v3 : 7.5
CPE cpe:2.3:a:fresnius-kabi:agilia_link\+:3.0:d15:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:vigilant_software_suite:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_partner_maintenance:*:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_link\+:*:*:*:*:*:*:*:*
cpe:2.3:a:fresnius-kabi:agilia_connect:*:*:*:*:*:*:*:*
CWE CWE-400
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01 - Third Party Advisory, US Government Resource

21 Jan 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-21 19:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-23236

Mitre link : CVE-2021-23236

CVE.ORG link : CVE-2021-23236


JSON object : View

Products Affected

fresenius-kabi

  • vigilant_centerium
  • vigilant_insight
  • agilia_connect
  • vigilant_mastermed
  • link\+_agilia
  • link\+_agilia_firmware
  • agilia_partner_maintenance_software
  • agilia_connect_firmware
CWE
CWE-400

Uncontrolled Resource Consumption