CVE-2021-37167
📋 TL;DR
This vulnerability allows attackers to gain root access on Swisslog Healthcare Nexus Panel devices by using default credentials. It affects HMI3 Control Panel in Nexus Panel systems running software versions before 7.2.5.7. Healthcare organizations using these medical device control systems are at risk.
💻 Affected Systems
- Swisslog Healthcare Nexus Panel
- HMI3 Control Panel
📦 What is this software?
Hmi 3 Control Panel Firmware by Swisslog Healthcare
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of medical device control systems allowing attackers to manipulate patient care equipment, steal sensitive medical data, or disrupt hospital operations.
Likely Case
Unauthorized root access leading to data exfiltration, system manipulation, or ransomware deployment on medical control systems.
If Mitigated
Limited impact if proper network segmentation and credential management are implemented, though risk remains if devices are accessible.
🎯 Exploit Status
Exploit requires knowledge of default credentials, which are often unchanged. Part of the 'PwnedPiper' vulnerability chain.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Nexus Software 7.2.5.7 or later
Vendor Advisory: https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures
Restart Required: Yes
Instructions:
1. Contact Swisslog Healthcare for patch 7.2.5.7. 2. Schedule maintenance window. 3. Apply patch following vendor instructions. 4. Restart affected devices. 5. Verify patch installation.
🔧 Temporary Workarounds
Change Default Credentials
allImmediately change all default credentials on Nexus Panel devices to strong, unique passwords.
Use device administration interface to change login credentials
Network Segmentation
allIsolate Nexus Panel devices on separate VLANs with strict firewall rules limiting access to authorized personnel only.
🧯 If You Can't Patch
- Immediately change all default credentials and implement multi-factor authentication if supported
- Isolate affected devices on segmented networks with strict access controls and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check device software version via administration interface. If version is below 7.2.5.7 and default credentials are unchanged, device is vulnerable.
Check Version:
Check via device administration interface or contact Swisslog Healthcare support for version verification
Verify Fix Applied:
Verify software version is 7.2.5.7 or higher and test that default credentials no longer provide access.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login with default credentials
- Root privilege escalation events
- Unauthorized configuration changes
Network Indicators:
- Unexpected SSH or administrative protocol connections to Nexus Panel devices
- Traffic to/from medical devices outside normal patterns
SIEM Query:
source="nexus-panel" AND (event_type="authentication" AND (user="default" OR user="admin") AND result="success") OR (event_type="privilege_escalation" AND user="root")
🔗 References
- https://www.armis.com/PwnedPiper
- https://www.swisslog-healthcare.com
- https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37167-bulletin---privilege-escalation.pdf?rev=20c909e5f00048838620b52471f266fc&hash=F43731C7A882EEBB5CE28DFBC75933D3
- https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20%2C%20%20CVE-2021-37164%20%204%20more%20rows%20
- https://www.armis.com/PwnedPiper
- https://www.swisslog-healthcare.com
- https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37167-bulletin---privilege-escalation.pdf?rev=20c909e5f00048838620b52471f266fc&hash=F43731C7A882EEBB5CE28DFBC75933D3
- https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20%2C%20%20CVE-2021-37164%20%204%20more%20rows%20