Article Details
Scrape Timestamp (UTC): 2023-10-26 05:25:25.275
Source: https://thehackernews.com/2023/10/critical-flaw-in-nextgens-mirth-connect.html
Original Article Text
Click to Toggle View
Critical Flaw in NextGen's Mirth Connect Could Expose Healthcare Data. Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to update to the latest version following the discovery of an unauthenticated remote code execution vulnerability. Tracked as CVE-2023-43208, the vulnerability has been addressed in version 4.4.1 released on October 6, 2023. "This is an easily exploitable, unauthenticated remote code execution vulnerability," Horizon3.ai's Naveen Sunkavally said in a Wednesday report. "Attackers would most likely exploit this vulnerability for initial access or to compromise sensitive healthcare data." Called the "Swiss Army knife of healthcare integration," Mirth Connect is a cross-platform interface engine used in the healthcare industry to communicate and exchange data between disparate systems in a standardized manner. Additional technical details about the flaw have been withheld in light of the fact that Mirth Connect versions going as far back as 2015/2016 have been found to be vulnerable to the issue. It's worth noting that CVE-2023-43208 is a patch bypass for CVE-2023-37679 (CVSS score: 9.8), a critical remote command execution (RCE) vulnerability in the software that allows attackers to execute arbitrary commands on the hosting server. While CVE-2023-37679 was described by its maintainers as only affecting servers running Java 8, Horizon3.ai's analysis found that all instances of Mirth Connect, regardless of the Java version, were susceptible to the problem. Given the ease with which the vulnerability can be trivially abused, coupled with the fact that the exploitation methods are well known, it's recommended to update Mirth Connect, particularly that are publicly accessible over the internet, to version 4.4.1 as soon as possible to mitigate potential threats.
Daily Brief Summary
A serious and easily exploited unauthenticated remote code execution vulnerability has been discovered in Mirth Connect, an open-source data integration platform developed by NextGen HealthCare.
The vulnerability, known as CVE-2023-43208, has been addressed in the latest 4.4.1 version of the software, released on October 6, 2023.
Mirth Connect, dubbed the "Swiss Army knife of healthcare integration", is widely used in the healthcare industry for data communication and exchange between different systems.
Some older versions of Mirth Connect, dating as far back as 2015/2016, have been found to be vulnerable to this issue.
The vulnerability, CVE-2023-43208, is a patch bypass for another critical remote command execution (RCE) vulnerability, CVE-2023-37679, which allows attackers to execute arbitrary commands on the server hosting Mirth Connect.
Despite initial claims that only servers running Java 8 were affected, further investigation by Horizon3.ai found that all instances of Mirth Connect were susceptible to the problem, regardless of the Java version.
Updating to Mirth Connect version 4.4.1, particularly for instances publicly accessible over the internet, is highly recommended as soon as possible, due to the high risk and well-known exploitation methods of this vulnerability.