First published: Thu Jan 30 2025(Updated: )
In its default configuration, Contec Health CMS8000 Patient Monitor transmits plain-text patient data to a hard-coded public IP address when a patient is hooked up to the monitor. This could lead to a leakage of confidential patient data to any device with that IP address or an attacker in a machine-in-the-middle scenario.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Contec Health CMS8000 |
Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. Please note that this device may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA's safety communication https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0683 is considered a high severity vulnerability due to the potential unauthorized access to confidential patient data.
To mitigate CVE-2025-0683, it is recommended to configure the Contec Health CMS8000 Patient Monitor to avoid transmitting data to hard-coded public IP addresses.
CVE-2025-0683 exposes plain-text patient data, which can include sensitive health information.
The Contec Health CMS8000 Patient Monitor is affected by CVE-2025-0683 in its default configuration.
Yes, CVE-2025-0683 can be exploited remotely by anyone capable of accessing the hard-coded public IP address.