The US cybersecurity agency, CISA, added a flaw in NextGen Healthcare’s Mirth Connect product to its catalog of Known Exploited Vulnerabilities (KEV).
A vulnerability in the open source product, known as CVE-2023-43208, allows remote code execution without authentication due to a data deserialization problem. A patch was rolled out with the release of version 4.4.1.
By infosecbulletin
/ Sunday , June 16 2024
Proofpoint found a fake website selling tickets for the Paris 2024 Summer Olympic Games. The website, "paris24tickets[.]com," claimed to be...
Read More
By infosecbulletin
/ Saturday , June 15 2024
ASUS released a new firmware update to fix a vulnerability affecting seven router models, which could be exploited by remote...
Read More
By infosecbulletin
/ Friday , June 14 2024
AWS announced new security features at its re:Inforce conference, such as identity and malware protection services. The cloud giant added...
Read More
By infosecbulletin
/ Friday , June 14 2024
A smartphone's IMEI (which stands for International Mobile Equipment Identity) is a unique identifier for each device, similar to a...
Read More
By infosecbulletin
/ Friday , June 14 2024
CISA released 20 advisories about Industrial Control Systems (ICS) on June 13, 2024. These advisories give important information about security...
Read More
By infosecbulletin
/ Thursday , June 13 2024
On a report titled "Surge on Web defacement and web application related vulnerabilities targeting Bangladesh" BGD e-GOV CIRT said, web...
Read More
By infosecbulletin
/ Thursday , June 13 2024
CISA warned that criminals are pretending to be its employees in phone calls in order to trick people into sending...
Read More
By infosecbulletin
/ Wednesday , June 12 2024
CISA added 2 new vulnerabilities to its catalog of known exploited vulnerabilities, because they have proof that these vulnerabilities are...
Read More
By infosecbulletin
/ Wednesday , June 12 2024
Microsoft has released updates for 49 security vulnerabilities in its Patch Tuesday update for June. One of the fixes addresses...
Read More
By infosecbulletin
/ Wednesday , June 12 2024
The Dutch military security service MIVD recently revealed that a cyber espionage campaign, which was initially mentioned in February, managed...
Read More
In October 2023, cybersecurity company Horizon3.ai alerted healthcare companies about a flaw called CVE-2023-43208. It is a variation of another flaw called CVE-2023-37679, which was fixed in Mirth Connect version 4.4.0.
Horizon3.ai described the vulnerability as easily exploitable and warned that attackers would likely exploit it to gain access or compromise sensitive healthcare data.
The security firm identified over 1,200 cases of NextGen Mirth Connect exposed on the internet.
Horizon3.ai released technical details and proof-of-concept (PoC) code in mid-January 2024. Shortly after, The Shadowserver Foundation found over 440 internet-exposed instances affected by CVE-2023-43208.
CISA added CVE-2023-43208 to its catalog and told government agencies to fix it by June 10.
The agency has not provided any information about the attacks. Microsoft mentioned the exploitation of CVE-2023-37679 and CVE-2023-43208 in a brief report in April.
Microsoft reported that Mirth Connect and other vulnerabilities were exploited by a China-based threat actor known as Storm-1175, who has used Medusa ransomware.
CISA may know about other attacks, but their KEV catalog does not mention ransomware exploitation. The CVE-2023-37679 flaw has not been added to the catalog yet.