CVE-2024-6796

8.2 HIGH

📋 TL;DR

An improper access control vulnerability in Baxter Connex health portal allows unauthenticated attackers to gain unauthorized database access and modify content. This affects healthcare organizations using Baxter Connex portal versions before August 30, 2024. The vulnerability could compromise patient health data and portal integrity.

💻 Affected Systems

Products:
  • Baxter Connex Health Portal
Versions: All versions released before August 30, 2024
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects healthcare environments using Baxter Connex portal for patient data management and medical device connectivity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of patient health records, modification of medical data leading to incorrect treatment, and potential ransomware deployment across healthcare systems.

🟠

Likely Case

Unauthorized access to patient data, modification of portal content, and potential data exfiltration affecting patient privacy and regulatory compliance.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring detecting unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows unauthenticated access, suggesting relatively straightforward exploitation once attack vectors are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version released on or after August 30, 2024

Vendor Advisory: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-249-01

Restart Required: Yes

Instructions:

1. Contact Baxter for updated Connex portal version. 2. Schedule maintenance window. 3. Backup current configuration and data. 4. Apply vendor-provided patch. 5. Restart portal services. 6. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Connex portal from internet and restrict access to authorized networks only

Access Control Lists

all

Implement strict firewall rules allowing only trusted IP addresses to access portal

🧯 If You Can't Patch

  • Implement network segmentation to isolate Connex portal from untrusted networks
  • Deploy web application firewall with strict access control rules and anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check portal version date - if before August 30, 2024, system is vulnerable

Check Version:

Check portal administration interface or contact Baxter support for version verification

Verify Fix Applied:

Confirm portal version date is August 30, 2024 or later and test authentication requirements

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to database endpoints
  • Unusual database queries from unauthenticated sources
  • Configuration changes without proper authentication

Network Indicators:

  • Unusual database traffic patterns
  • Unauthorized access to portal database ports
  • Traffic bypassing authentication endpoints

SIEM Query:

source_ip NOT IN authorized_ips AND (destination_port=db_port OR uri_path CONTAINS '/database/')

🔗 References

📤 Share & Export