ZOLL Defibrillator Dashboard
ZOLL Defibrillator Dashboard versions prior to 2.2 contain multiple vulnerabilities including arbitrary file upload (CWE-434), hardcoded or improperly stored credentials (CWE-321, CWE-257), insufficient data protection (CWE-312), cross-site scripting (CWE-79), and improper access control (CWE-269). Successful exploitation allows remote code execution, credential theft, or modification of application data and functionality. The vulnerabilities require valid dashboard user credentials but affect the confidentiality, integrity, and availability of device monitoring and operational data.
- Network access to the Defibrillator Dashboard web interface
- Valid user credentials (dashboard login account)
- Knowledge of at least one of the specific vulnerability classes (file upload, credential storage, or input validation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8000850a-fc47-445e-9f69-6b2bcb72a568Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.