CVE-2021-27489

8.8 HIGH

📋 TL;DR

This vulnerability allows non-administrative users to upload malicious files to the ZOLL Defibrillator Dashboard web application, potentially enabling remote code execution. It affects ZOLL Defibrillator Dashboard versions prior to 2.2. Healthcare organizations using this medical device management software are at risk.

💻 Affected Systems

Products:
  • ZOLL Defibrillator Dashboard
Versions: All versions prior to 2.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This is a medical device management system used in healthcare environments. Default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control of the defibrillator dashboard system, potentially compromising connected medical devices, stealing sensitive patient data, or disrupting critical healthcare operations.

🟠

Likely Case

An attacker with basic user access uploads a malicious file to execute commands, potentially gaining administrative privileges or accessing sensitive medical device data.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to the dashboard application itself without affecting connected medical devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid user account but no administrative privileges. The vulnerability is in file upload functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2

Vendor Advisory: https://www.zoll.com/medical-products/software/defibrillator-dashboard

Restart Required: Yes

Instructions:

1. Contact ZOLL technical support for version 2.2 update. 2. Backup current configuration. 3. Install the 2.2 update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict File Upload Permissions

all

Configure the application to only allow administrative users to upload files.

Implement File Type Restrictions

all

Configure web application firewall or application settings to block executable file uploads.

🧯 If You Can't Patch

  • Isolate the dashboard system on a separate network segment with strict access controls
  • Implement application-level monitoring for file upload activities and command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check the dashboard version in the application interface or configuration files. Versions below 2.2 are vulnerable.

Check Version:

Check the application's About or Help menu, or examine the installation directory for version information.

Verify Fix Applied:

Verify the application version shows 2.2 or higher after patching. Test file upload functionality with non-admin accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads by non-administrative users
  • Execution of unexpected system commands
  • Failed file upload attempts with suspicious extensions

Network Indicators:

  • Unusual outbound connections from the dashboard system
  • Traffic patterns indicating command and control activity

SIEM Query:

source="ZOLL Dashboard" AND (event="file_upload" AND user_role!="admin") OR (event="command_execution")

🔗 References

📤 Share & Export