Vulnerability Details CVE-2021-23207
An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 26.2%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 2.1
Products affected by CVE-2021-23207
-
cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*
-
cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0
-
cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0
-
cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0
-
cpe:2.3:h:fresenius-kabi:agilia_connect:-
-
cpe:2.3:h:fresenius-kabi:link+_agilia:-
-
cpe:2.3:o:fresenius-kabi:agilia_connect:*
-
cpe:2.3:o:fresenius-kabi:link+_agilia_firmware:*
-
cpe:2.3:o:fresenius-kabi:link+_agilia_firmware:3.0