Hillrom Medical Device Management
Welch Allyn ELI series resting electrocardiograph devices contain hardcoded credentials and improper access control vulnerabilities (CWE-259, CWE-284) that allow authenticated attackers to execute arbitrary commands with elevated privileges. Successful exploitation could enable command execution, privilege escalation, sensitive data disclosure, and detection evasion. Affected models include ELI 150c, 250c, 280, and 380. No public exploits are currently known. Hillrom has committed to software updates for all models but availability ranges from May 2022 (ELI 280) to Q4 2023 (ELI 150c and 380).
- Network access to the electrocardiograph device (ports 21 FTP, 22 SSH, or 23 Telnet)
- Valid low-privilege user credentials for device access
- No encryption key configured for ELI Link and Cardiograph (if using default configuration)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c74b3326-7776-4d86-8aca-eec100910e95Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.