Note:
This project will be discontinued after December 13, 2021. [more]
Product:
M1000_multipara_patient_monitor_firmware
(Niscomed)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-08-26 | CVE-2020-15484 | An issue was discovered on Nescomed Multipara Monitor M1000 devices. The internal storage of the underlying Linux system stores data in cleartext, without integrity protection against tampering. | M1000_multipara_patient_monitor_firmware | 7.5 | ||
2020-08-26 | CVE-2020-15482 | An issue was discovered on Nescomed Multipara Monitor M1000 devices. The device enables an unencrypted TELNET service by default, with a blank password for the admin account. This allows an attacker to gain root access to the device over the local network. | M1000_multipara_patient_monitor_firmware | 7.8 | ||
2020-08-26 | CVE-2020-15483 | An issue was discovered on Nescomed Multipara Monitor M1000 devices. The physical UART debug port provides a shell, without requiring a password, with complete access. | M1000_multipara_patient_monitor_firmware | 6.8 | ||
2020-08-26 | CVE-2020-15485 | An issue was discovered on Nescomed Multipara Monitor M1000 devices. The onboard Flash memory stores data in cleartext, without integrity protection against tampering. | M1000_multipara_patient_monitor_firmware | 5.5 |