CVE-2020-25172

9.8 CRITICAL

📋 TL;DR

CVE-2020-25172 is a critical path traversal vulnerability in B. Braun OnlineSuite that allows unauthenticated attackers to upload or download arbitrary files. This affects OnlineSuite Version AP 3.0 and earlier, primarily impacting healthcare organizations using these medical device management systems.

💻 Affected Systems

Products:
  • B. Braun OnlineSuite
Versions: Version AP 3.0 and earlier
Operating Systems: Windows-based medical device systems
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the OnlineSuite application used for managing B. Braun medical devices and infusion systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to upload malicious files, execute arbitrary code, steal sensitive medical data, or disrupt critical medical device operations.

🟠

Likely Case

Unauthorized file access leading to data exfiltration, system manipulation, or installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to compromise systems exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires network access to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are typically easy to exploit once discovered, and unauthenticated access makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OnlineSuite Version AP 3.1 or later

Vendor Advisory: https://www.bbraun.com/en/products-and-therapies/services/cybersecurity.html

Restart Required: Yes

Instructions:

1. Contact B. Braun technical support for patch availability. 2. Schedule maintenance window for medical device systems. 3. Apply patch following vendor instructions. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate OnlineSuite systems from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules to limit access to OnlineSuite systems

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check OnlineSuite version in application interface or contact B. Braun support

Check Version:

Check through OnlineSuite application interface or system documentation

Verify Fix Applied:

Verify OnlineSuite version is AP 3.1 or later and test file upload/download functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload/download patterns
  • Path traversal patterns in web logs (../ sequences)
  • Unauthenticated access attempts to file operations

Network Indicators:

  • Unusual file transfer patterns to/from OnlineSuite systems
  • HTTP requests containing path traversal sequences

SIEM Query:

source="online_suite_logs" AND (uri="*../*" OR method="POST" AND uri="*/upload*" OR method="GET" AND uri="*/download*")

🔗 References

📤 Share & Export