Lucene search

K
saintSAINT CorporationSAINT:E91C15905DE22774AF555FEA554C78A5
HistoryMay 23, 2024 - 12:00 a.m.

Mirth Connect deserialization vulnerability

2024-05-2300:00:00
SAINT Corporation
download.saintcorporation.com
139
mirth connect
vulnerability
deserialization
remote execution
command
api
upgrade
linux
healthcare
systems

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0.974

Percentile

99.9%

Added: 05/23/2024

Background

Mirth Connect is an application which translates message standards for healthcare systems.

Problem

A deserialization vulnerability in Mirth Connect allows remote attackers to execute arbitrary commands by sending a specially crafted API request.

Resolution

Upgrade to Mirth Connect 4.4.1 or higher.

References

<https://www.horizon3.ai/attack-research/attack-blogs/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/&gt;

Limitations

Exploit works on Linux systems.

Platforms

Linux

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0.974

Percentile

99.9%