Article Details
Scrape Timestamp (UTC): 2024-05-21 07:28:13.435
Source: https://thehackernews.com/2024/05/nextgen-healthcare-mirth-connect-under.html
Original Article Text
Click to Toggle View
NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaw, tracked as CVE-2023-43208 (CVSS score: N/A), concerns a case of unauthenticated remote code execution arising from an incomplete patch for another critical flaw CVE-2023-37679 (CVSS score: 9.8). Details of the vulnerability were first revealed by Horizon3.ai in late October 2023, with additional technical specifics and a proof-of-concept (PoC) exploit released earlier this January. Mirth Connect is an open-source data integration platform widely used by healthcare companies, allowing for data exchange between different systems in a standardized manner. CVE-2023-43208 is "ultimately related to insecure usage of the Java XStream library for unmarshalling XML payloads," security researcher Naveen Sunkavally said, describing the flaw as easily exploitable. CISA has not provided any information about the nature of attacks exploiting the flaw, and it is unclear who weaponized them or when the in-the-wild exploitation was recorded. Also added to the KEV catalog is a newly disclosed type of confusion bug impacting the Google Chrome browser (CVE-2024-4947) that the tech giant has acknowledged as exploited in real-world attacks. Federal agencies are required to update to a patched version of the software – Mirth Connect version 4.4.1 or later and Chrome version 125.0.6422.60/.61 for Windows, macOS, and Linux – by June 10, 2024, to secure their networks against active threats.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a security flaw in NextGen Healthcare Mirth Connect.
Identified as CVE-2023-43208, the vulnerability allows for unauthenticated remote code execution and stems from an incomplete fix of a previous issue.
This flaw exploits insecure practices in the Java XStream library's handling of XML data, making it easy for attackers to exploit.
CISA has mandated federal agencies to upgrade their Mirth Connect systems to version 4.4.1 or later by June 10, 2024, to mitigate risks.
There are no details on who is behind the attacks or the specific nature of the attacks exploiting this vulnerability.
The vulnerability was first disclosed by Horizon3.ai and further detailed by researchers in January 2023.
Additionally, CISA also added an exploited vulnerability in Google Chrome to its KEV catalog, urging updates to patched versions.
Mirth Connect is a critical integration platform used by healthcare organizations for data exchange between varied systems.