Unknown
CVE-2018-10601
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2018-10601
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that exposes an “echo” service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- avalon fetal/maternal monitors fm20 firmware -,
- avalon fetal/maternal monitors fm30 firmware -,
- avalon fetal/maternal monitors fm40 firmware -,
- avalon fetal/maternal monitors fm50 firmware -,
- intellivue mp2 firmware -,
- intellivue mp30 firmware -,
- intellivue mp50 firmware -,
- intellivue mp70 firmware -,
- intellivue mx100 firmware -,
- intellivue mx400 firmware -,
- intellivue mx450 firmware -,
- intellivue mx500 firmware -,
- intellivue mx550 firmware -,
- intellivue mx700 firmware -,
- intellivue mx800 firmware -,
- intellivue np90 firmware -,
- intellivue x2 firmware -,
- intellivue x3 firmware -
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: