Baxter Welch Allyn Configuration Tool
Welch Allyn Product Configuration Tool versions 1.9.4.1 and earlier contain a credential exposure vulnerability (CWE-522) that could allow an attacker to extract stored credentials through user interaction. The credentials exposed by this vulnerability could be used to gain unauthorized access to Welch Allyn medical devices and their management interfaces. Baxter has removed the Configuration Tool from public access and will release version 1.9.4.2 in Q3 2024 to address this issue. Until the patch is available, Baxter recommends contacting Technical Support to have configuration files created by Baxter rather than using the potentially vulnerable tool directly.
- User interaction required (user must open malicious file or link)
- Access to a system with Welch Allyn Configuration Tool version 1.9.4.1 or earlier installed
- Network or physical access to the affected workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a7322e99-fbf7-40f6-95e8-bcaf1c413b89Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.