CVE-2021-37164

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Swisslog Healthcare Nexus Panel's HMI3 Control Panel allows remote attackers to execute arbitrary code or cause denial of service. The vulnerability affects Swisslog Healthcare Nexus Panel software versions before 7.2.5.7. This impacts healthcare facilities using Swisslog's pneumatic tube system control panels.

💻 Affected Systems

Products:
  • Swisslog Healthcare Nexus Panel HMI3 Control Panel
Versions: All versions before Nexus Software 7.2.5.7
Operating Systems: Embedded/Proprietary OS on Swisslog hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the pneumatic tube system control panels used in hospitals for transporting medical supplies.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, disruption of critical medical supply transport systems, and potential patient safety impacts.

🟠

Likely Case

Denial of service causing pneumatic tube system outages, disrupting hospital operations and delaying critical medical deliveries.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and systems are patched.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects critical healthcare infrastructure.
🏢 Internal Only: HIGH - Even internally, exploitation could disrupt essential hospital operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Part of the 'PwnedPiper' vulnerability chain with public exploit details available from Armis research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Nexus Software 7.2.5.7 or later

Vendor Advisory: https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures

Restart Required: Yes

Instructions:

1. Contact Swisslog Healthcare support. 2. Obtain patch version 7.2.5.7 or later. 3. Schedule maintenance window. 4. Apply patch following vendor instructions. 5. Restart affected systems. 6. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Nexus Panel systems from untrusted networks and implement strict firewall rules.

Access Control

all

Restrict network access to only authorized administrative systems and personnel.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Monitor network traffic for anomalous connections to Nexus Panel systems

🔍 How to Verify

Check if Vulnerable:

Check software version on Nexus Panel interface or contact Swisslog Healthcare support for version verification.

Check Version:

Check via Nexus Panel administrative interface or contact Swisslog Healthcare for version verification tools.

Verify Fix Applied:

Verify software version is 7.2.5.7 or later through system interface or vendor confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to Nexus Panel systems
  • System crash or restart events
  • Abnormal process behavior

Network Indicators:

  • Unexpected TCP connections to Nexus Panel ports
  • Malformed network packets targeting affected systems

SIEM Query:

source_ip=* AND dest_port=[Nexus Panel Ports] AND (payload_size>normal OR malformed_packet_detected)

🔗 References

📤 Share & Export