The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might overlap CVE-2015-3459.
References
Link | Resource |
---|---|
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm | Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01 | Third Party Advisory US Government Resource |
https://xs-sniper.com/blog/2015/06/08/hospira-plum-a-infusion-pump-vulnerabilities/ | |
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm | Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01 | Third Party Advisory US Government Resource |
https://xs-sniper.com/blog/2015/06/08/hospira-plum-a-infusion-pump-vulnerabilities/ |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2015-07-06 19:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-5406
Mitre link : CVE-2014-5406
CVE.ORG link : CVE-2014-5406
JSON object : View
Products Affected
hospira
- lifecare_pca3
- lifecare_pca5
- lifecare_pcainfusion_firmware
CWE
CWE-345
Insufficient Verification of Data Authenticity