GE CARESCAPE, ApexPro, and Clinical Information Center systems
GE CARESCAPE patient monitoring systems, ApexPro telemetry servers, and Clinical Information Center systems contain multiple vulnerabilities (CWE-256, CWE-20, CWE-798, CWE-306, CWE-434, CWE-326) affecting versions: Clinical Information Center 4.X and 5.X; CARESCAPE Central Station 1.X and 2.X; CARESCAPE Telemetry Server 4.3 and earlier; ApexPro Telemetry Server 4.2 and earlier; and B650/B850/B450 monitor units. Successful exploitation occurs if an attacker gains access to the mission-critical (MC) or information exchange (IX) network segments. Exploits could result in loss of patient monitoring and alarms, unauthorized access to protected health information, OS-level compromise of devices, tampering with alarm settings and thresholds, and disruption of remote management services. The vulnerabilities stem from improper network configuration, weak authentication, missing input validation, insecure file handling, and inadequate encryption. GE states no patches will be provided; remediation relies on proper network isolation and configuration per GE technical documentation.
- Access to the mission-critical (MC) or information exchange (IX) network segment
- Either: (1) Network misconfiguration allowing external connectivity to these segments, or (2) Physical access to devices on these networks to plug in directly
- No special credentials or authentication bypass required for some exploitation paths
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5af8836f-35b3-4bc3-b23f-6d09c8e5ca02