{"vuid":"VU#482135","idnumber":"482135","name":"MEDHOST Perioperative Information Management System contains hard-coded database credentials","keywords":["medhost","pims","vpims","hard-coded credentials","database"],"overview":"MEDHOST Perioperative Information Management System (PIMS) versions prior to 2015R1 contain hard-coded credentials that are used for customer database access.","clean_desc":"CWE-798: Use of Hard-coded Credentials - CVE-2016-4328 MEDHOST PIMS, previously branded as VPIMS, contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the application database server may be able to obtain or modify sensitive patient information.","impact":"An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the application database server may be able to obtain or modify patient information.","resolution":"Apply an upgrade The vendor has addressed the use of hard-coded credentials in PIMS 2015R1 and newer versions. Administrators are encouraged to upgrade to the latest release.","workarounds":"Restrict network access As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using the hard-coded credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Daniel Dunstedter for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://www.medhost.com/offerings/advanced-perioperative","https://cwe.mitre.org/data/definitions/798.html"],"cveids":["CVE-2016-4328"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-03-02T16:13:09Z","publicdate":"2016-05-26T00:00:00Z","datefirstpublished":"2016-05-26T17:37:31Z","dateupdated":"2016-05-26T17:37:31Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"H","cvss_securityrequirementsar":"H","cvss_basescore":"8.3","cvss_basevector":"AV:A/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"6.9","cvss_environmentalscore":"1.95480312372134","cvss_environmentalvector":"CDP:LM/TD:L/CR:ND/IR:H/AR:H","metric":0.0,"vulnote":null}