CVE-2022-26388
📋 TL;DR
This CVE describes a hard-coded password vulnerability in multiple Hillrom ELI electrocardiograph devices. Attackers who discover the hard-coded credentials could gain unauthorized access to device functions. This affects specific versions of ELI 380, 280, 250c, and 150c series resting electrocardiographs used in healthcare settings.
💻 Affected Systems
- ELI 380 Resting Electrocardiograph
- ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph
- ELI 250c/BUR 250c Resting Electrocardiograph
- ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains administrative access to medical devices, potentially modifying device configurations, accessing patient data, or disrupting critical medical monitoring functions during patient care.
Likely Case
Unauthorized access to device settings and configuration menus, potentially allowing device misuse or data access in healthcare environments.
If Mitigated
With proper network segmentation and access controls, impact is limited to isolated medical device networks with no patient safety implications.
🎯 Exploit Status
Exploitation requires knowledge of the hard-coded credentials, which are not publicly disclosed in the CVE. Attack complexity is low once credentials are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Hillrom for specific patched versions
Vendor Advisory: https://hillrom.com/en/responsible-disclosures/
Restart Required: Yes
Instructions:
1. Contact Hillrom technical support for patched firmware versions. 2. Schedule maintenance window for device updates. 3. Follow Hillrom's firmware update procedures for each affected device model. 4. Verify successful update and functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices on dedicated medical device networks with strict access controls
Physical Security Controls
allRestrict physical access to devices and ensure they're in secure clinical areas
🧯 If You Can't Patch
- Implement strict network segmentation to isolate devices from general hospital networks
- Monitor device access logs for unauthorized authentication attempts and review regularly
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via device settings menu or Hillrom management tools. Compare against affected version ranges.
Check Version:
Device-specific: Typically accessed through device settings menu or Hillrom proprietary management software
Verify Fix Applied:
Confirm firmware version has been updated to a version not listed in affected ranges. Test authentication with previously known hard-coded credentials (if known) to ensure they no longer work.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful login
- Authentication from unexpected network locations or users
- Configuration changes made outside normal maintenance windows
Network Indicators:
- Network traffic to device management interfaces from unauthorized sources
- Authentication attempts using default/hard-coded credential patterns
SIEM Query:
Example: (device_type="ELI_ECG" AND auth_success=true) OR (device_type="ELI_ECG" AND config_change=true)