-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2854
   Smiths-Medical CADD-Solis Medication Safety Software Vulnerabilities
                              5 December 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Smiths-Medical CADD-Solis Medication Safety Software
Publisher:         ICS-CERT
Operating System:  Windows
Impact/Access:     Increased Privileges           -- Existing Account            
                   Provide Misleading Information -- Remote with User Interaction
                   Access Privileged Data         -- Remote with User Interaction
Resolution:        Mitigation
CVE Names:         CVE-2016-8358 CVE-2016-8355 

Original Bulletin: 
   https://ics-cert.us-cert.gov/advisories/ICSMA-16-306-01

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSMA-16-306-01)

Smiths-Medical CADD-Solis Medication Safety Software Vulnerabilities

Original release date: December 01, 2016

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided 
"as is" for informational purposes only. The Department of Homeland Security 
(DHS) does not provide any warranties of any kind regarding any information 
contained within. DHS does not endorse any commercial product or service, 
referenced in this product or otherwise. Further dissemination of this product 
is governed by the Traffic Light Protocol (TLP) marking in the header. For more 
information about TLP, see http://www.us-cert.gov/tlp/.

OVERVIEW

This advisory was originally posted to the US-CERT secure Portal library on 
November 1, 2016, and is being released to the NCCIC/ICS-CERT web site.
Smiths-Medical has reported two vulnerabilities in Smiths-Medical's CADD-Solis 
Medication Safety Software that were identified by Andrew Gothard of Newcastle 
Upon Tyne Hospitals NHS Foundations Trust. Smiths-Medical has produced new 
versions to mitigate these vulnerabilities. Smiths-Medical reports that an 
independent security expert has tested the new versions to validate that they 
resolve the identified vulnerabilities.
These vulnerabilities could be exploited remotely.

AFFECTED PRODUCTS

The following CADD-Solis Medication Safety Software versions are affected:

Smiths-Medical CADD-Solis Medication Safety Software, Version 1.0;
Smiths-Medical CADD-Solis Medication Safety Software, Version 2.0;
Smiths-Medical CADD-Solis Medication Safety Software, Version 3.0; and
Smiths-Medical CADD-Solis Medication Safety Software, Version 3.1

IMPACT

Successful exploitation of these vulnerabilities may allow an authenticated 
user to add users, delete users, and to modify permissions via the CADD-Solis 
Medication Safety Software. Drug libraries can also be modified in the 
CADD-Solis Medication Safety Software. However, to update the drug libraries on 
a pump, a laptop with the CADD-Solis Medication Safety Software would have to 
be physically plugged into one of two different types of pumps, the CADD-Prizm 
System and the CADD-Solis Ambulatory Infusion Pump.

Impact to individual organizations depends on many factors that are unique to
each organization. ICS-CERT recommends that organizations evaluate the impact 
of these vulnerabilities based on their operational environment and specific 
clinical usage.

BACKGROUND

Smiths-Medical is headquartered in Plymouth, Minnesota, and is a subsidiary 
of Smiths Group plc, which is a UK-based company.

The affected product, the CADD-Solis Medication Safety Software, is an 
application that is used to set dosage limits for infusion pumps. According 
to Smiths-Medical, the CADD-Solis Medication Safety Software can interface 
with the CADD-Prizm System and the CADD-Solis Ambulatory Infusion Pump, 
which are deployed across the Healthcare and Public Health sector. 
Smiths-Medical estimates that this product is sold worldwide.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE[a]
CADD-Solis Medication Safety Software grants an authenticated user elevated 
privileges on the SQL database, which would allow an authenticated user to 
modify drug libraries, add and delete users, and change user permissions. 
According to Smiths-Medical, physical access to the pump is required to install 
drug library updates.
CVE-2016-8355[b] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.9 has been assigned; the CVSS vector string is 
(AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).[c]

MAN-IN-THE-MIDDLE[d]
The affected software does not verify the identities at communication endpoints, 
which may allow a remote attacker to gain access to the communication channel 
between endpoints.
CVE-2016-8358[e] has been assigned to this vulnerability. A CVSS v3 base score 
of 8.5 has been assigned; the CVSS vector string is 
(AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).[f]

VULNERABILITY DETAILS

EXPLOITABILITY

These vulnerabilities could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target these vulnerabilities.

DIFFICULTY

An attacker with low skill would be able to exploit these vulnerabilities.

MITIGATION

Smiths-Medical has released new versions of the CADD-Solis Medication Safety 
Software, which mitigates the identified vulnerabilities. The new versions of 
Smiths-Medical's CADD-Solis Medication Safety Software are Version 3.2, which 
is distributed within the continental US, and Version 4.1, which is released 
outside the continental US.

Smiths-Medical recommends that CADD-Solis Medication Safety Software users 
install the applicable new version. In addition, Smiths-Medical also recommends 
that users take the following additional security measures:

Apply strict password standards across systems to include, requiring the use of 
upper case, lower case, special characters, and a minimum password length of 8 
characters.
Establish and effectively manage an Active directory.

Create an SQL Express database account with managed permissions for use with 
the CADD-Solis Medication Safety Software.

Establish and assign managed Services Accounts for all servers and medical 
infusion pumps.

Use Virtual Local Area Network (VLAN) tagging.

Implement server hardening procedures for both SQL and Windows servers.

For additional information about the identified vulnerabilities or to obtain the 
new version of the CADD-Solis Medication Safety Software, contact Smiths-Medical 
Technical Support at:

Telephone: +1 (800) 258 5361 or +01 614 210 7300;

Email: info.asd@smiths-medical.com (link sends e-mail).

ICS-CERT recommends that users take defensive measures to minimize the risk of 
exploitation of these vulnerabilities. Specifically, users should:

Minimize network exposure for all medical devices and/or systems, and ensure 
that they are not accessible from the Internet.

Locate all medical devices and remote devices behind firewalls, and isolate 
them from the business network.

When remote access is required, use secure methods, such as Virtual Private 
Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be 
updated to the most current version available. Also recognize that VPN is only 
as secure as the connected devices.
ICS-CERT also provides a section for security recommended practices on the 
ICS-CERT web page at http://ics-cert.us-cert.gov/content/recommended-practices. 
ICS-CERT reminds organizations to perform proper impact analysis and risk 
assessment prior to deploying defensive measures.
Additional mitigation guidance and recommended practices are publicly available
in the ICS-CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber 
Intrusion Detection and Mitigation Strategies, that is available for download 
from the ICS-CERT web site (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their 
established internal procedures and report their findings to ICS-CERT for 
tracking and correlation against other incidents.
a. 
CWE-732: Incorrect Permission Assignment for Critical Resource, 
https://cwe.mitre.org/data/definitions/732.html, web site last accessed 
December 01, 2016.
b. 
NVD, https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8355, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.
c. 
CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S..., 
web site last accessed December 01, 2016.
d. 
CWE-300: Channel Accessible by Non-Endpoint ("Man-in-the-Middle"), 
https://cwe.mitre.org/data/definitions/300.html, web site last accessed 
December 01, 2016.
e. 
NVD, https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8358, NIST uses 
this advisory to create the CVE web site report. This web site will be active 
sometime after publication of this advisory.
f. 
CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S..., 
web site last accessed December 01, 2016.

Contact Information
For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov (link sends e-mail)
Toll Free: 1-877-776-7585
International Callers: (208) 526-0900
For industrial control systems security information and incident reporting: 
http://ics-cert.us-cert.gov

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=25Rs
-----END PGP SIGNATURE-----