CVE Vulnerabilities

CVE-2021-38398

Reliance on Component That is Not Updateable

Published: Oct 04, 2021 | Modified: Sep 10, 2022
CVSS 3.x
6.8
MEDIUM
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.

Weakness

The product contains a component that cannot be updated or patched in order to remove vulnerabilities or significant bugs.

Affected Software

Name Vendor Start Version End Version
Zoom_latitude_programming_system_model_3120_firmware Bostonscientific - (including) - (including)

Extended Description

          If the component is discovered to contain a vulnerability or critical bug, but the issue cannot be fixed using an update or patch, then the product's owner will not be able to protect against the issue.  The only option might be replacement of the product, which could be too financially or operationally expensive for the product owner.  As a result, the inability to patch or update can leave the product open to attacker exploitation or critical operation failures. This weakness can be especially difficult to manage when using ROM, firmware, or similar components that traditionally have had limited or no update capabilities.
		  

            In industries such as healthcare, "legacy"
            devices can be operated for decades.  As a
            US task force report [REF-1197] notes, "the inability
            to update or replace equipment has both
            large and small health care delivery
            organizations struggle with numerous
            unsupported legacy systems that cannot
            easily be replaced (hardware, software, and
            operating systems) with large numbers of
            vulnerabilities and few modern
            countermeasures."
		    

            While hardware can be prone to this weakness, software systems can also be affected, such as when a third-party driver or library is no longer actively maintained or supported but is still critical for the required functionality.

Potential Mitigations

References