Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.
Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.
The following mitigations could assist in reducing the risk for exploitation of vulnerabilities:
Disabling UART functionality at the CPU level
Enforcing unique device authentication before granting access to the terminal / bootloader
Where possible, enforcing secure boot.
Tamper stickers on the device casing to indicate when a device has been opened
Exploits
Credits
Level Nine reported these vulnerabilities to CISA.
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.