CVE-2024-23619

9.8 CRITICAL

📋 TL;DR

IBM Merge Healthcare eFilm Workstation contains hardcoded credentials that allow remote unauthenticated attackers to access the system. This vulnerability enables information disclosure and potentially remote code execution, affecting all deployments of this medical imaging software.

💻 Affected Systems

Products:
  • IBM Merge Healthcare eFilm Workstation
Versions: All versions prior to patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Medical imaging workstations typically store sensitive patient data and may be connected to hospital networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, patient data exfiltration, and potential ransomware deployment on medical imaging systems.

🟠

Likely Case

Unauthorized access to sensitive patient health information (PHI) and medical imaging data stored on affected workstations.

🟢

If Mitigated

Limited impact if systems are isolated from networks and internet, though local network access could still enable exploitation.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems immediately vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any network-accessible system can be exploited by attackers who gain internal access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hardcoded credentials make exploitation trivial once discovered. Public technical details available in Exodus Intelligence blog posts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IBM security advisory for specific patched version

Vendor Advisory: https://www.ibm.com/support/pages/node/7144855

Restart Required: Yes

Instructions:

1. Check IBM security advisory for patched version. 2. Download and install the update from IBM support portal. 3. Restart the eFilm Workstation application. 4. Verify the fix by testing authentication.

🔧 Temporary Workarounds

Network Isolation

windows

Remove eFilm Workstation from network access to prevent remote exploitation

Disable network adapters or configure firewall to block all inbound/outbound traffic to eFilm Workstation

Application Firewall Rules

windows

Block all network traffic to eFilm Workstation process

Windows Firewall: New Rule → Program → Path to eFilm.exe → Block all connections

🧯 If You Can't Patch

  • Isolate system from all networks including hospital internal networks
  • Implement strict network segmentation and monitor for any connection attempts to the workstation

🔍 How to Verify

Check if Vulnerable:

Attempt to authenticate to eFilm Workstation using known hardcoded credentials from public disclosures

Check Version:

Check Help → About in eFilm Workstation application or examine installed programs in Windows Control Panel

Verify Fix Applied:

Verify that hardcoded credentials no longer work and proper authentication is required

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login with unusual credentials
  • Network connections to eFilm Workstation from unauthorized sources

Network Indicators:

  • Unexpected network traffic to eFilm Workstation default ports
  • Authentication attempts using hardcoded credentials

SIEM Query:

source="efilm-workstation" AND (event_type="authentication" AND result="success" AND user="[hardcoded_username]")

🔗 References

📤 Share & Export