CVE-2022-26388

6.4 MEDIUM

📋 TL;DR

This CVE describes a hard-coded password vulnerability in multiple Hillrom ELI electrocardiograph devices. Attackers who discover the hard-coded credentials could gain unauthorized access to device functions. This affects specific versions of ELI 380, 280, 250c, and 150c series resting electrocardiographs used in healthcare settings.

💻 Affected Systems

Products:
  • ELI 380 Resting Electrocardiograph
  • ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph
  • ELI 250c/BUR 250c Resting Electrocardiograph
  • ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph
Versions: ELI 380: 2.6.0 and prior; ELI 280 series: 2.3.1 and prior; ELI 250c series: 2.1.2 and prior; ELI 150c series: 2.2.0 and prior
Operating Systems: Embedded medical device OS
Default Config Vulnerable: ⚠️ Yes
Notes: These are medical devices typically deployed in hospital and clinical environments, not general-purpose computing systems.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative access to medical devices, potentially modifying device configurations, accessing patient data, or disrupting critical medical monitoring functions during patient care.

🟠

Likely Case

Unauthorized access to device settings and configuration menus, potentially allowing device misuse or data access in healthcare environments.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated medical device networks with no patient safety implications.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the hard-coded credentials, which are not publicly disclosed in the CVE. Attack complexity is low once credentials are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Hillrom for specific patched versions

Vendor Advisory: https://hillrom.com/en/responsible-disclosures/

Restart Required: Yes

Instructions:

1. Contact Hillrom technical support for patched firmware versions. 2. Schedule maintenance window for device updates. 3. Follow Hillrom's firmware update procedures for each affected device model. 4. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices on dedicated medical device networks with strict access controls

Physical Security Controls

all

Restrict physical access to devices and ensure they're in secure clinical areas

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices from general hospital networks
  • Monitor device access logs for unauthorized authentication attempts and review regularly

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via device settings menu or Hillrom management tools. Compare against affected version ranges.

Check Version:

Device-specific: Typically accessed through device settings menu or Hillrom proprietary management software

Verify Fix Applied:

Confirm firmware version has been updated to a version not listed in affected ranges. Test authentication with previously known hard-coded credentials (if known) to ensure they no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Authentication from unexpected network locations or users
  • Configuration changes made outside normal maintenance windows

Network Indicators:

  • Network traffic to device management interfaces from unauthorized sources
  • Authentication attempts using default/hard-coded credential patterns

SIEM Query:

Example: (device_type="ELI_ECG" AND auth_success=true) OR (device_type="ELI_ECG" AND config_change=true)

🔗 References

📤 Share & Export