First published: Thu Jan 30 2025(Updated: )
Contec Health CMS8000 Patient Monitor is vulnerable to an out-of-bounds write, which could allow an attacker to send specially formatted UDP requests in order to write arbitrary data. This could result in remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Contec Health CMS8000 |
Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. Please note that this device may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA's safety communication https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12248 is considered a critical vulnerability due to its potential for remote code execution.
To address CVE-2024-12248, update the Contec Health CMS8000 Patient Monitor to the latest firmware version provided by the vendor.
CVE-2024-12248 can be exploited by sending specially formatted UDP requests that trigger an out-of-bounds write.
The Contec Health CMS8000 Patient Monitor is the primary affected product by CVE-2024-12248.
Exploiting CVE-2024-12248 could lead to remote code execution, allowing an attacker to gain control over the patient monitor.