exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MEDHOST Connex Hard-Coded Credentials

MEDHOST Connex Hard-Coded Credentials
Posted Jul 25, 2017
Authored by Allen Franks

MEDHOST Connex suffers from having hard-coded credentials that are used for customer database access.

tags | exploit
advisories | CVE-2017-11614
SHA-256 | 3ec6996dd81186f3e6b24b5054c626a66031e271872c3bff28c529d9fc080d1e

MEDHOST Connex Hard-Coded Credentials

Change Mirror Download
Overview
------------

MEDHOST Connex for all versions contains hard-coded credentials that
are used for customer
database access. This is a new vulnerability not related to CVE-2016-4328.

Description
------------

MEDHOST Connex contains hard-coded credentials that are used for
customer database
access. An attacker with knowledge of the hard-coded credentials and the ability
to communicate directly with the database may be able to obtain
or modify sensitive patient and financial information.

Connex utilizes an IBM i DB2 user account for database access. The
account name is HMSCXPDN.
This password is hard-coded in multiple places of the application.
Customers do not have the option to change this password. The account
has elevated DB2 roles, and can access all objects or database tables
on the customer DB2 database. This account can access data through
odbc, ftp, and telnet.

Customers w/o Connex installed are still vulnerable. The MEDHOST setup
program creates this account. Connex provides connectivity to exchange
clinical information with the MEDHOST application. /1

Impact
------------

An attacker with knowledge of the hard-coded credentials and the
ability to communicate
directly with the application database server may be able to obtain or
modify patient
and financial information.

Solution
------------

The vendor has not issued a patch and has been unresponsive to this
information after 3 attempts
to communicate.

Restrict network access

As a general security practice, only allow connections from trusted
hosts and networks.
Restricting access would prevent an attacker from using the hard-coded
database credentials
from a blocked network location.

References

/1 http://www.clinical-innovation.com/topics/health-it/himss-hms-launches-hms-connex-showcase-ambulatory-ehr
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close