Vulnerability Details : CVE-2011-5324
The TeraRecon server, as used in GE Healthcare Centricity PACS-IW 3.7.3.7, 3.7.3.8, and possibly other versions, has a password of (1) shared for the shared user and (2) scan for the scan user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
Products affected by CVE-2011-5324
- cpe:2.3:a:gehealthcare:centricity_pacs-iw:3.7.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gehealthcare:centricity_pacs-iw:3.7.3.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-5324
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-5324
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2011-5324
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5324
-
http://apps.gehealthcare.com/servlet/ClientServlet/3.7.3.7+Installation+Guide.pdf?REQ=RAA&DIRECTION=DOC0947634&FILENAME=3.7.3.7%2BInstallation%2BGuide.pdf&FILEREV=1&DOCREV_ORG=1
Support Documentation Library - Support | GE Healthcare
-
http://apps.gehealthcare.com/servlet/ClientServlet/3.7.3.8+Installation+guide.pdf?REQ=RAA&DIRECTION=DOC1059456&FILENAME=3.7.3.8%2BInstallation%2Bguide.pdf&FILEREV=1&DOCREV_ORG=1
Support Documentation Library - Support | GE Healthcare
-
http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/
Vulnerable Breasts And Brains? Cancer Scan Tech Has Terrible Password Security
-
https://twitter.com/digitalbond/status/619250429751222277
Dale Peterson on Twitter: "Funny slide with GE default password word cloud. Go bigguy! #Shakacon http://t.co/t1dcIziQza"
Jump to