Advisory Issued About Vulnerabilities in Siemens RAPIDLab and RAPIDPoint Blood Gas Analyzers

Share this article on:

Siemens has proactively issued an advisory over two recently discovered vulnerabilities in its RAPIDLab and RAPIDPoint Blood Gas Analyzers.

No reports have been received to data to suggest either vulnerability has been exploited in the wild, although users of the devices are being encouraged to take steps to mitigate risk.

The vulnerabilities affect Siemens RAPIDLab 1200 Series and RAPIDPoint 400/405/500 cartridge-based blood-gas, electrolyte, and metabolite analyzers.

CVE-2018-4845 would allow local or remote credentialed access to the Remote View feature. Successful exploitation of the vulnerability could result in privilege escalation that could potentially compromise the confidentiality, integrity, and availability of the system. No user interaction would be required to exploit the vulnerability. The vulnerability has been assigned a CVSS v3.0 score of 8.8.

CVE-2018-4846 relates to a factory account with a hardcoded password which could potentially be exploited to gain remote access to the device over port 8900/tcp, thus compromising the confidentiality, integrity, and availability of the device. Exploitation would require no privileges or user interaction. The vulnerability has been assigned a CVSS v3.0 score of 7.3. No special skills would be required to exploit either vulnerability.

No patch has been issued to correct the flaws at present, although Siemens has identified workarounds and mitigations that will reduce the risk of the vulnerabilities being exploited, as detailed in the table below:

Affected Product and Versions Remediation
RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems:

All versions without use of Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Disable Remote Viewing feature by following the instructions in the “Enabling or Disabling Remote Viewing” section of the analyzer Operator’s Guide to limit exposure to CVE-2018-4845 and mitigate CVE-2018- 4846.

RAPIDLab 1200 Series:

All versions < V3.3 with Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Upgrade to V3.3 or 3.3.1. Please contact your Siemens Healthineers service desk for more information.

·         Change the password according to the release notes, or contact the service department.

·         To ensure seamless and secure connectivity with the RAPIDComm® Data Management System, RAPIDComm® V7.0 or higher is recommended.

RAPIDPoint 500 systems:

All versions >= V3.0 with Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Change the password according to the release notes or contact the service department.

·         To ensure seamless and secure connectivity with RAPIDComm, RAPIDComm V7.0 or higher is recommended.

RAPIDPoint 500 systems:

V2.4.X with Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Upgrade to and follow instructions provided for V3.0.

RAPIDPoint 500 systems:

All versions =< V2.3 with Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Siemens Healthineers will update this advisory when new information becomes available.

RAPIDPoint 400 systems:

All versions with Siemens Healthineers Informatics products

·         Restrict physical access to only authorized individuals to limit exposure to CVE-2018- 4845.

·         Upgrade to RAPIDPoint 500 Series.

·         If upgrading is not an option, disable Remote Viewing feature by following the instructions in the “Enabling or Disabling Remote Viewing” section of the analyzer Operator’s Guide to limit exposure to CVE-2018- 4845 and mitigate CVE-2018-4846.

Author: HIPAA Journal

Share This Post On