CVE-2019-15933
📋 TL;DR
CVE-2019-15933 is a critical SQL injection vulnerability in Intesync Solismed 3.3sp electronic medical record software. Attackers can execute arbitrary SQL commands through unvalidated user input, potentially compromising patient data and system integrity. Healthcare organizations using this specific version are affected.
💻 Affected Systems
- Intesync Solismed
📦 What is this software?
Solismed by Intesync
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to theft of all patient records (PHI), administrative credential theft, remote code execution on the database server, and potential ransomware deployment across the healthcare network.
Likely Case
Unauthorized access to patient medical records, modification of treatment data, extraction of sensitive personal information, and potential privilege escalation to administrative accounts.
If Mitigated
Limited to attempted SQL injection attempts logged by WAF/database firewalls with no successful data exfiltration or system compromise.
🎯 Exploit Status
SQL injection vulnerabilities are trivial to exploit with automated tools like sqlmap. The Bishop Fox advisory provides technical details that facilitate exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.3sp
Vendor Advisory: https://www.solismed.com/
Restart Required: Yes
Instructions:
1. Contact Intesync support for the latest patched version. 2. Backup current installation and database. 3. Apply the vendor-provided patch or upgrade to a fixed version. 4. Restart the Solismed application services. 5. Validate functionality post-upgrade.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy a WAF with SQL injection rules to block exploitation attempts
Network Segmentation
allIsolate Solismed server from internet and restrict access to authorized users only
🧯 If You Can't Patch
- Immediately isolate the Solismed server from internet access and restrict network connectivity to essential healthcare systems only
- Implement database activity monitoring and alert on unusual SQL queries or data extraction patterns
🔍 How to Verify
Check if Vulnerable:
Check Solismed version via web interface or configuration files. If version is exactly 3.3sp, system is vulnerable.
Check Version:
Check web interface login page or consult Solismed administration panel for version information
Verify Fix Applied:
Confirm version is no longer 3.3sp and test SQL injection payloads return proper error messages rather than executing.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts followed by complex SQL queries
- Database queries with UNION SELECT, INFORMATION_SCHEMA, or other SQL injection patterns
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, DROP, etc.) to Solismed endpoints
- Unusual outbound database connections from application server
SIEM Query:
source="solismed_logs" AND ("SQL syntax" OR "union select" OR "information_schema")
🔗 References
- https://bishopfox.com
- https://know.bishopfox.com/advisories/solismed-critical
- https://www.bishopfox.com/blog/news-category/advisories/
- https://www.solismed.com/
- https://bishopfox.com
- https://know.bishopfox.com/advisories/solismed-critical
- https://www.bishopfox.com/blog/news-category/advisories/
- https://www.solismed.com/