Skip to main content

Critical Vulnerability in Medtronic Paceart Optima System

The Critical vulnerability could allow an unauthenticated user to perform remote code execution or create a DoS condition

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

The Critical vulnerability could allow an unauthenticated user to perform remote code execution or create a DoS condition


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Medtronic has released a security advisory addressing a Critical vulnerability in Medtronic Paceart Optima Systems. The Critical vulnerability is known as CVE-2023-31222 and has a CVSSv3 score of 9.8.

This vulnerability concerns deserialisation of untrusted data, which could allow an unauthenticated attacker to perform remote code execution, create a denial-of-service (DoS) condition, or execute commands via specifically crafted requests. A successful DoS attack could cause the Paceart Optima system to slow or become unresponsive.


Remediation advice

Affected organisations are encouraged to review Medtronic's Paceart Optima System Application Security Update and apply any relevant updates.

The US Cyber Security and Infrastructure Agency (CISA) has also released a medical advisory classified ICSMA-23-180-01.

Medtronic has advised organisations with a combined Application and Integration Server to contact Medtronic Paceart Optima System technical support for immediate mitigation actions.

For all other configurations, Medtronic recommends the following steps: 

Manually disable the Paceart Messaging Service on the Application Server. 

  1. Open the “Windows Services” application.
  2. Find the ‘Paceart Messaging Service’
  3. Right-click the “Paceart Messaging Service” and select “Properties.”
  4. Select “Stop” to stop running the service and change the startup type to “Disabled.”
  5. Select ”Apply.”

Manually disable message queuing on the Application Server. 

  1. Open server manager.
  2. Select “Add roles and features.”
  3. Select “Start the Remove Roles and Features Wizard.”
  4. Before you begin–next.
  5. Server selection–next.
  6. Server roles–next.
  7. Features section–take action. Select the black box next to Message Queuing.
  8. When the window pops up select the “Remove Features” button.
  9. Select “next.”
  10. Confirmation–select “Remove.”

As long as the Paceart Messaging Service remains disabled, the vulnerability will remain mitigated. 



Last edited: 30 June 2023 2:15 pm