CVE-2021-35193

7.5 HIGH

📋 TL;DR

Patterson Eaglesoft dental practice management software versions 18-21 has a certificate authentication flaw where the same certificate is accepted across different customer installations. This allows attackers to bypass client-side authentication and remotely access SQL database credentials. Dental practices using affected Eaglesoft versions are vulnerable.

💻 Affected Systems

Products:
  • Patterson Eaglesoft
Versions: 18 through 21
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Patterson Application Service component. Requires Eaglesoft installation with Patterson Application Service enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of patient databases including PHI/PII data, financial records, and practice operations data leading to data breach, ransomware, or system destruction.

🟠

Likely Case

Unauthorized access to patient databases resulting in data theft, potential HIPAA violations, and practice disruption.

🟢

If Mitigated

Limited impact if network segmentation prevents external access to Eaglesoft servers and proper authentication controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code available on GitHub. Attackers can develop custom clients to bypass authentication. No authentication required to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://patterson.eaglesoft.net/Home/Contact-Us

Restart Required: No

Instructions:

Contact Patterson Dental support for guidance. No official patch information available in public sources.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Eaglesoft servers from untrusted networks and internet access

Firewall Rules

all

Restrict access to Patterson Application Service ports to authorized IPs only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Eaglesoft servers
  • Monitor for unusual database access patterns and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Eaglesoft version in Help > About. If version is 18, 19, 20, or 21, system is vulnerable.

Check Version:

Check Eaglesoft application version via Help > About menu

Verify Fix Applied:

Contact Patterson Dental support for verification. No public verification method available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL database connection attempts
  • Failed authentication attempts to Patterson Application Service
  • Unexpected client connections to Eaglesoft services

Network Indicators:

  • Unusual traffic to Eaglesoft database ports from unauthorized sources
  • Custom client connections bypassing normal authentication patterns

SIEM Query:

source="eaglesoft" AND (event_type="authentication_failure" OR event_type="database_access")

🔗 References

📤 Share & Export