First published: Thu Jan 30 2025(Updated: )
The "monitor" binary in the firmware of the affected product attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function also enables the network interface of the device if it is disabled. The function is triggered by attempting to update the device from the user menu. This could serve as a backdoor to the device, and could lead to a malicious actor being able to upload and overwrite files on the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Contec Health CMS8000 |
Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. Please note that this device may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA's safety communication https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0626 is considered a high-severity vulnerability due to its potential to create a backdoor for unauthorized access.
To mitigate CVE-2025-0626, it is recommended to restrict network access and apply any available vendor patches or updates.
The risks of CVE-2025-0626 include unauthorized file uploads and modifications, potentially compromising patient data and device functionality.
CVE-2025-0626 specifically affects the Contec Health CMS8000 Patient Monitor.
As of now, there is no public indication that CVE-2025-0626 is actively being exploited, but it poses significant risk.