Fresenius Kabi Agilia Connect Infusion System (Update A)
Plan Patch7.5ICS-CERT ICSMA-21-355-01Dec 21, 2021
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Fresenius Kabi Agilia Connect infusion pump system and related software contain multiple vulnerabilities (CWE-400, CWE-327, CWE-522, CWE-284, CWE-256, CWE-552, CWE-548, CWE-79, CWE-798, CWE-603, CWE-1104) in the WiFi module, maintenance software, and Link+ control interface. Successful exploitation allows an attacker to gain access to sensitive information, modify settings or parameters, or perform arbitrary actions as an authenticated user.
What this means
What could happen
An attacker could access patient data stored in the infusion system, modify medication delivery parameters (dose rates, drug type), or disrupt pump operation, potentially affecting patient safety. The system handles critical medication delivery, so unauthorized changes could cause serious harm.
Who's at risk
Hospitals and healthcare facilities using Fresenius Kabi Agilia Connect infusion pump systems should care about this advisory. Specifically, the Agilia Connect WiFi module, Agilia Partner maintenance software, and Agilia Link+ control interface are affected. Any facility relying on these devices for medication delivery should prioritize assessment and patching.
How it could be exploited
An attacker with network access to the Agilia Connect WiFi module or the Link+ control software could exploit weak encryption, authentication flaws, or insecure file permissions to gain authenticated access and modify infusion parameters or extract sensitive patient information. The attack requires network reachability to the device or software, which may be possible if the system is connected to a hospital network or accessible over WiFi.
Prerequisites
- Network access to the Agilia Connect WiFi module or Link+ software interface
- Knowledge of valid authentication credentials or exploitation of weak authentication mechanisms
- System must be networked; air-gapped systems are not vulnerable
remotely exploitableweak encryption and authentication mechanismsaffects safety-critical medical devicesno public exploit but high criticality of infusion systemsapproximately 1,200 early Link+ devices cannot be patched and require hardware replacement
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
Agilia Connect WiFi module of the pumps: vD25 and prior≤ D25D29 or later
Agilia Partner maintenance software: v3.3.0 and prior≤ 3.3.03.3.2 or later
Agilia Link+: v3.0 D15 and prior≤ 3.0 D153.0 D16 or later
Remediation & Mitigation
0/7
Do now
0/3HARDENINGIsolate infusion pump networks from the business network and Internet using firewalls and network segmentation
HARDENINGEnsure infusion pump systems are not accessible from the Internet
WORKAROUNDIf remote access is required, use VPN with the most current version available
Schedule — requires maintenance window
0/4Patching may require device reboot — plan for process interruption
HOTFIXUpdate Agilia Connect Pumps WiFi Module to firmware D29 or later
HOTFIXUpdate Agilia Link+ to version 3.0 D16 or later (note: approximately 1,200 early Link+ devices require hardware replacement and cannot be updated)
HOTFIXUpdate Agilia Partner to version 3.3.2 or later
HOTFIXUpdate VSS to version 1.0.3 or later
CVEs (13)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/c13ea2c5-ddbb-4483-bb45-83f44e73b56d