Headline
CVE-2023-47262: Product Advisories
In Abbott ID NOW before 7.1, settings can be modified via physical access to an internal serial port.
Access the most recent product security updates from Abbott and its suppliers here.****NOVEMBER 14, 2023****Product Security Bulletin: ID Now
Abbott has reviewed the level of potential impact of this vulnerability on product performance and safety, and has taken appropriate steps to mitigate this issue in its latest software update, v7.1.
****JANUARY 5, 2022******Product Security Bulletin: Apache Log4j**
Abbott is aware of the recently discovered remote code execution vulnerability impacting Apache Log4j, a logging tool commonly used in Java-based software applications.
DECEMBER 8, 2020****Product Security Bulletin: Amnesia:33
Abbott is proactively monitoring developments related to the recently identified vulnerabilities in third-party open-source networking software components (TCP/IP stacks), commonly referred to as "Amnesia:33".
****SEPTEMBER 7, 2020******Product Security Bulletin: Treck TCP/IP "Ripple 20"**
Abbott is proactively monitoring developments related to the recently identified vulnerabilities in the Treck TCP/IP stack, commonly referred to as"Ripple 20". According to published reports, including the CISA Alert1, the security vulnerabilities in the software that supports network connectivity could allow remote code execution or exposure of sensitive information.
****OCTOBER 8, 2020******Product Security Bulletin: “Sweyntooth” BLE**
Abbott is proactively monitoring developments related to the recently identified vulnerabilities in third-party Bluetooth Low Energy (BLE) components, commonly referred to as “SweynTooth”. According to published reports, including the CISA Alert1, the vulnerabilities expose flaws in specific BLE components from multiple chip manufacturers that could allow an unauthorized user to interrupt BLE communication or bypass security.
****NOVEMBER 2, 2020******Product Security Bulletin: Microsoft CryptoAPI Spoofing**
Abbott is monitoring developments related to the recently published CISA Alert (Alert AA20-014A) identifying vulnerabilities in Microsoft’s Windows CryptoAPI, an application programming interface that enables developers to secure Windows-based applications.
****JULY 7, 2020******Product Security Bulletin: VxWorks IPNet Vulnerabilities**
Abbott is monitoring developments related to recently published advisory (ICSA-19-211-01) identifying 11 IPNet vulnerabilities in Wind River’s VxWorks and other widely used Real Time Operating Systems (RTOSs). These vulnerabilities were reported by security researchers at Armis and are sometimes referred to as “Urgent/11”. RTOSs are used in a wide variety of products, including printers, routers, medical devices, firewalls, VOIP phones and industrial controllers.
****MAY 22, 2019******Product Security Bulletin: Microsoft RDP**
Abbott is aware of and actively monitoring updates related to the Remote Desktop Services Remote Code Execution vulnerability (CVE-2019-0708), which was announced by Microsoft on May 14, 2019.
****JANUARY 12, 2018******Product Security Bulletin: Meltdown/Spectre**
The National Health Information Sharing and Analysis Center (NH-ISAC) has issued an advisory to the industry regarding Meltdown and Spectre, two new widespread cybersecurity vulnerabilities impacting processors in nearly every computer and mobile device.
Related news
Scans of the Internet find that millions of computers, virtual machines, and containers are vulnerable to one or more of the hundreds of cyberattacks currently used in the wild, despite being patchable.
Prometei botnet continued its activity since Cisco Talos first reported about it in 2020. Since November 2022, we have observed Prometei improving the infrastructure components and capabilities.
The health, manufacturing, and energy sectors are the most vulnerable to ransomware.
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.
Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.
On May 14, Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. In our previous blog post on this topic we warned that the vulnerability is ‘wormable’, and that future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.
Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.