CVE-2018-7510

9.8 CRITICAL

📋 TL;DR

This vulnerability exposes passwords in plaintext in an unauthenticated accessible file in BeaconMedaes TotalAlert Scroll Medical Air Systems. Attackers can read sensitive credentials without authentication, affecting medical facilities using vulnerable versions of this critical infrastructure.

💻 Affected Systems

Products:
  • BeaconMedaes TotalAlert Scroll Medical Air Systems
Versions: Software versions prior to 4107600010.23
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: This is medical infrastructure equipment used in healthcare facilities for medical air supply systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access medical air systems, potentially disrupting oxygen supply to patients or manipulating critical medical infrastructure.

🟠

Likely Case

Credential theft leading to unauthorized access to medical air systems, potentially enabling system manipulation or data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable interface.

🌐 Internet-Facing: HIGH - The vulnerability requires no authentication and exposes sensitive credentials directly.
🏢 Internal Only: HIGH - Even internal attackers or compromised internal systems can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only reading an accessible file containing plaintext passwords.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4107600010.23

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01

Restart Required: Yes

Instructions:

1. Contact BeaconMedaes for patch 4107600010.23. 2. Apply the software update following vendor instructions. 3. Restart the system as required. 4. Verify the fix by checking that passwords are no longer stored in plaintext accessible files.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the medical air system on a separate VLAN with strict access controls to prevent unauthorized network access.

Access Control Lists

all

Implement firewall rules to restrict access to the web interface only from authorized management stations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from untrusted networks
  • Monitor for unauthorized access attempts to the web interface and file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if the system software version is below 4107600010.23 and attempt to access password files without authentication via the web interface.

Check Version:

Check via the web interface system information page or contact BeaconMedaes support for version verification.

Verify Fix Applied:

Verify software version is 4107600010.23 or higher and confirm password files are no longer accessible without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to password files
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual traffic patterns to the medical air system web interface
  • Access from unauthorized IP addresses

SIEM Query:

source_ip IN (unauthorized_ips) AND destination_port=80 AND uri CONTAINS 'password' OR 'credential'

🔗 References

📤 Share & Export