Risk: High. A CVSS v3 grade of 9.8 has been calculated. The CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Date Discovered by CyberMDX: May 8, 2018
ICS-CERT Advisory date: August 28, 2018
CyberMDX discovered a previously undocumented vulnerability in the device, noting that Qualcomm Life’s Capsule Datacaptor Terminal Server (a medical device gateway) is exposed to the “misfortune cookie” CVE-2014-9222. This opens the possibility for remote arbitrary memory write, which can lead to unauthorized login and code execution.
Qualcomm Life’s Datacaptor Terminal Server is a popular medical gateway device in the Capsule product line used by hospitals to connect their medical devices to the larger digital network infrastructure. The gateway is typically used to connect bedside devices such as monitors, respirators, anesthesia delivery systems, and infusion pumps.
Like many other IoT devices, the Capsule Datacaptor Terminal Server has a web management interface used for configuration.
The web management uses a software component named “RomPager” from AllegroSoft. The “RomPager” version being used by the Capsule Datacaptor Terminal Server is of an earlier version than 4.07, and is rendered vulnerable to CVE-2014-9222, AKA “Misfortune Cookie”.
The “Misfortune Cookie” vulnerability was discovered by Checkpoint in 2014. Back then, researchers primarily focused on home routers when searching affected devices.
Using a specially crafted cookie, an attacker can write data to an arbitrarily address in the device memory, opening the door to a denial of service attack, unauthenticated login, code execution, and more.
Altering the availability and/or configuration of the Capsule Datacaptor Terminal Server directly influences the connectivity of the medical device and allows spoofing communication to and/or from the medical device. In other words — when patient’s sensitive information is sent from a medical device it can be leaked and spoofed by an attacker in this situation.
After collaboration with Qualcomm Life, we recommend updating your Qualcomm Life Capsule devices to their latest software versions in order to overcome this vulnerability. As a preventive action, we advise disabling access to the device’s management ports, including HTTP — or at least restricting it to relevant parties only.
Qualcomm Life, Inc. (QCL) and its subsidiary Capsule Technologies SAS have been made aware of a vulnerability in the Capsule Datacaptor Terminal Server (DTS) and Capsule has confirmed the vulnerability in all versions of the DTS. The vulnerability affects the embedded Allegrosoft RomPager web server that is integrated within DTS devices.
The vulnerability was first reported to QCL by Elad Luz, head of research at CyberMDX. Named the “Misfortune Cookie” and referenced by CVE-2014-9222, the vulnerability is associated with the processing of cookies by the web server. Specifically, this vulnerability allows an attacker to send a specially crafted HTTP cookie to the web management portal to write arbitrary data to the device memory. This could allow unauthorized code to be executed and could allow the attacker to obtain administrator-level privileges on the device.
At this time, QCL is not aware of any exploitation of this vulnerability on DTS products deployed in customer facilities.
This vulnerability does not affect any other Capsule Technologies products.
Capsule has released a firmware update to remediate this vulnerability on the “Single Board” version of the DTS, that was originally released mid-2009. Capsule strongly urges all customers with a Single Board version of the DTS to download the firmware from Capsule’s Customer Portal and apply it to the affected devices following your standard patching processes.
Due to technical limitations, the firmware update will remediate ONLY the Single Board version of the DTS and will NOT remediate these other versions of DTS:
Capsule recommends that customers with any of these three versions of DTS disable the embedded webserver to mitigate the vulnerability. The webserver is only utilized for configuration during the initial deployment and is not necessary for continued remote support of the device.
Elad Luz, Head of Research at CyberMDX
CyberMDX’s research and analyst team regularly works with medical device organizations in the responsible disclosure of security vulnerabilities. The threat intelligence team works tirelessly to defend hospitals and healthcare organizations from malicious attacks. The team’s researchers, white hat hackers, and engineers collect information about possible attack paths to understand attacker motives, means, and methods in an effort to deliver the best protection possible.