{"containers":{"cna":{"affected":[{"product":"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor","vendor":"Contec Health","versions":[{"status":"affected","version":"All"}]}],"credits":[{"lang":"en","value":"Level Nine reported these vulnerabilities to CISA."}],"datePublic":"2022-09-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-09-13T14:54:50.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}],"source":{"advisory":"ICSMA-22-244-01","discovery":"EXTERNAL"},"title":"Contec Health CMS8000","workarounds":[{"lang":"en","value":"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"}],"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2022-09-01T17:00:00.000Z","ID":"CVE-2022-38100","STATE":"PUBLIC","TITLE":"Contec Health CMS8000"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor","version":{"version_data":[{"version_affected":"=","version_name":"All","version_value":"All"}]}}]},"vendor_name":"Contec Health"}]}},"credit":[{"lang":"eng","value":"Level Nine reported these vulnerabilities to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400 Uncontrolled Resource Consumption"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}]},"source":{"advisory":"ICSMA-22-244-01","discovery":"EXTERNAL"},"work_around":[{"lang":"en","value":"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:45:52.412Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:54:20.725304Z","id":"CVE-2022-38100","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:10:19.613Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-38100","datePublished":"2022-09-13T14:54:50.356Z","dateReserved":"2022-08-29T00:00:00.000Z","dateUpdated":"2025-04-16T16:10:19.613Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}