exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MEDHOST Connex Hardcoded Password

MEDHOST Connex Hardcoded Password
Posted Jul 31, 2017
Authored by Allen Franks

MEDHOST Connex contains a hard-coded Mirth Connect administrative credential that is used for customer Mirth Connect management access.

tags | exploit
advisories | CVE-2017-11743
SHA-256 | cda33f4b8f74ced06fc2e4ed54419dc5dfee4468eadbb61de781b387fcd999b6

MEDHOST Connex Hardcoded Password

Change Mirror Download
CVE-2017-11743

Overview
------------
MEDHOST Connex contains a hard-coded Mirth Connect admin password in
all versions. This is a new vulnerability not related to
CVE-2016-4328, CVE-2017-11614, CVE-2017-11693 or CVE-2017-11694.

Description
------------

MEDHOST Connex contains a hard-coded Mirth Connect admin credential
that is used for customer Mirth Connect management access. An attacker
with knowledge of the hard-coded credential and the ability to
communicate directly with the Mirth Connect management console may be
able to intercept sensitive patient information. The admin account
password is hard-coded throughout the application, and is the same
across all installations. Customers do not have the option to change
the Mirth Connect admin account password. The Mirth Connect admin
account is created during the Connex install. The plaintext account
password is hard-coded multiple times in the Connex install and update
scripts.

- connex-*.noarch.rpm

$ grep password connex-*.noarch.rpm
sed -i 's/^password.*/password=\$K8t1ng/'
/opt/mirthconnect/conf/mirth-cli-config.properties

Impact
------------

An attacker with knowledge of the hard-coded credential and the
ability to communicate directly with the Mirth Connect management
console may be able to obtain sensitive patient information.

Solution
------------

The vendor has not issued a patch and has been unresponsive to this
information after 3 attempts to communicate.

Restrict network access

As a general security practice, only allow connections from trusted
hosts and networks. Restricting access would prevent an attacker from
using the hard-coded database credentials from a blocked network
location.


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close