Your review has been sent successfully

Swisslog Update

2631
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

4 August, 2021

● Critical

2021-3300

HealthCare

Description:

Swisslog has released a security update to address multiple vulnerabilities in the following product:

  • Translogic Pneumatic Tube Systems
    • Nexus Control Panel, versions prior to 7.2.5.7

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Execute arbitrary code remotely
  • Improper Authentication
  • Download of Code without Integrity Check

Best practice and Recommendations:

Swisslog Healthcare recommends upgrading to the latest software version as soon as it becomes available.They also recommend the following mitigation methods until updated software is deployed:

  • Network firewalls that restrict inter-VLAN traffic on the network must allow inbound and outbound internal network connections for the ports listed in “Windows firewalls.”
    • Do not restrict these ports to specific applications.
  • If there is no firewall between the SCC and the floor devices, apply an extended access control list (ACL) in the Layer 3 VLAN that is dedicated to the PTS floor equipment.
    • Both inbound and outbound access lists are required between the SCC server and floor equipment, allowing the use of the TCP and UDP ports listed.
  • Employ an IDS (intrusion detection system) such as SNORT to detect exploitation attempts.

Last updated at 4 August, 2021

Rate the content

rate-icon
up icon