{"containers":{"cna":{"affected":[{"product":"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor","vendor":"Contec Health","versions":[{"status":"affected","version":"All"}]}],"credits":[{"lang":"en","value":"Level Nine reported these vulnerabilities to CISA."}],"datePublic":"2022-09-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":3,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-489","description":"CWE-489 Leftover Debug Code","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-09-13T14:55:03.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}],"source":{"advisory":"ICSMA-22-244-01","discovery":"EXTERNAL"},"title":"Contec Health CMS8000","workarounds":[{"lang":"en","value":"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"}],"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2022-09-01T17:00:00.000Z","ID":"CVE-2022-38453","STATE":"PUBLIC","TITLE":"Contec Health CMS8000"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor","version":{"version_data":[{"version_affected":"=","version_name":"All","version_value":"All"}]}}]},"vendor_name":"Contec Health"}]}},"credit":[{"lang":"eng","value":"Level Nine reported these vulnerabilities to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":3,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-489 Leftover Debug Code"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}]},"source":{"advisory":"ICSMA-22-244-01","discovery":"EXTERNAL"},"work_around":[{"lang":"en","value":"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:54:03.773Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:49:56.819949Z","id":"CVE-2022-38453","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:09:53.917Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-38453","datePublished":"2022-09-13T14:55:03.842Z","dateReserved":"2022-08-29T00:00:00.000Z","dateUpdated":"2025-04-16T16:09:53.917Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}