Swisslog Update
2631Warning Date
Severity Level
Warning Number
Target Sector
4 August, 2021
● Critical
2021-3300
HealthCare
Description:
Swisslog has released a security update to address multiple vulnerabilities in the following product:
- Translogic Pneumatic Tube Systems
- Nexus Control Panel, versions prior to 7.2.5.7
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Execute arbitrary code remotely
- Improper Authentication
- Download of Code without Integrity Check
Best practice and Recommendations:
Swisslog Healthcare recommends upgrading to the latest software version as soon as it becomes available.They also recommend the following mitigation methods until updated software is deployed:
- Network firewalls that restrict inter-VLAN traffic on the network must allow inbound and outbound internal network connections for the ports listed in “Windows firewalls.”
- Do not restrict these ports to specific applications.
- If there is no firewall between the SCC and the floor devices, apply an extended access control list (ACL) in the Layer 3 VLAN that is dedicated to the PTS floor equipment.
- Both inbound and outbound access lists are required between the SCC server and floor equipment, allowing the use of the TCP and UDP ports listed.
- Employ an IDS (intrusion detection system) such as SNORT to detect exploitation attempts.