CVE-2024-1629

6.2 MEDIUM

📋 TL;DR

A path traversal vulnerability in the 'deleteFiles' function of GE HealthCare's Common Service Desktop component allows attackers to delete arbitrary files on ultrasound devices. This affects GE HealthCare ultrasound systems running vulnerable versions of the Common Service Desktop software.

💻 Affected Systems

Products:
  • GE HealthCare ultrasound devices with Common Service Desktop component
Versions: Specific versions not detailed in available references
Operating Systems: Proprietary medical device OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects ultrasound devices in clinical environments. Exact product models and versions should be verified through GE HealthCare security advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, potentially rendering the ultrasound device inoperable and disrupting medical services.

🟠

Likely Case

Disruption of ultrasound device functionality through deletion of configuration or data files, requiring service intervention to restore.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the vulnerable component.

🌐 Internet-Facing: LOW (Medical devices typically should not be directly internet-facing)
🏢 Internal Only: MEDIUM (Requires network access to the device, but medical networks often have multiple connected systems)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to the vulnerable component and knowledge of the specific API endpoint. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://securityupdate.gehealthcare.com/

Restart Required: Yes

Instructions:

1. Contact GE HealthCare support for specific patch information. 2. Schedule maintenance window for medical device updates. 3. Apply patch following GE HealthCare's medical device update procedures. 4. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ultrasound devices on separate VLANs with strict access controls

Access Control Lists

all

Implement firewall rules to restrict access to Common Service Desktop ports

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected ultrasound devices
  • Monitor network traffic to/from ultrasound devices for suspicious file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check with GE HealthCare support for specific version vulnerability assessment

Check Version:

Device-specific commands provided by GE HealthCare (consult device documentation)

Verify Fix Applied:

Verify patch installation through GE HealthCare device management tools and confirm version updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in device logs
  • Multiple delete operations from single source
  • File deletion attempts outside expected directories

Network Indicators:

  • Unusual traffic patterns to ultrasound device management ports
  • Multiple HTTP requests to delete endpoints

SIEM Query:

source="ultrasound_device" AND (event_type="file_deletion" OR action="delete") AND path NOT CONTAINS "expected_directory"

🔗 References

📤 Share & Export