ZOLL ePCR IOS Mobile Application
A vulnerability in ZOLL ePCR IOS Mobile Application version 2.6.7 allows unauthorized access to protected health information and device telemetry. The flaw arises from insufficient protection of sensitive data stored locally on the device (CWE-538: Information Exposure Through Query Strings in GET Request). An attacker with physical access to a device could extract patient records and operational data without authentication. ZOLL decommissioned the ePCR IOS application in May 2025 and has no plans for a replacement. Users should contact ZOLL Support for migration guidance.
- Physical access to an iOS device running ePCR application version 2.6.7
- Device must be unlocked or have insufficient device-level security controls
- Application data must be present on the device
/api/v1/advisories/70dbd834-e2eb-410e-a48a-9e9ce1c3710aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.