Your one-stop web resource providing safety and security information to manufacturers

Qualcomm Life has a mitigation in place to handle a code weakness vulnerability in its Capsule Datacaptor Terminal Server (DTS), according to a report with NCCIC.

Successful exploitation of this remotely exploitable vulnerability, discovered by Elad Luz of CyberMDX, could allow an attacker to execute unauthorized code to obtain administrator-level privileges on the device.

Modicon Vulnerabilities Fixed
Schneider Modicon M221 Hole Fixed
Schneider Fills PowerLogic Hole
ABB Fix Coming for eSOMS

Part of a medical device information system, Allegro RomPager embedded web server versions 4.01 through 4.34 included in Capsule DTS, all versions suffer from the issue.

This vulnerability allows an attacker to send a specially crafted HTTP cookie to the web management portal to write arbitrary data to the device memory, which may allow remote code execution.

Cyber Security

CVE-2014-9222 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product sees use mainly in the healthcare and public health sectors. It sees action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

Qualcomm Life reports this vulnerability does not affect any other Capsule Technologies products. Capsule Technologies released a firmware update to remediate this vulnerability on the “Single Board” version of the DTS, which was originally released in 2009. Capsule Technologies urges all users with a Single Board version of the DTS to download the firmware from Capsule’s customer portal and apply it to the affected devices following standard patching processes. Click here for access to the customer portal.

Due to technical limitations, the firmware update will remediate only the Single Board version of the DTS, and will not remediate these other versions of DTS:
• Dual Board
• Capsule Digi Connect ES converted to DTS
• Capsule Digi Connect ES

Capsule recommends users with any of these three versions of DTS disable the embedded webserver to mitigate the vulnerability. The webserver is only utilized for configuration during the initial deployment and is not necessary for continued remote support of the device.

Click here for additional information regarding the affected versions of the embedded Allegro RomPager webserver included in Capsule DTS.

Pin It on Pinterest

Share This