Description
A use of hard-coded password vulnerability may allow authentication abuse.This issue affects ELI 380 Resting Electrocardiograph:

Versions 2.6.0 and prior; ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph:

Versions 2.3.1 and prior; ELI 250c/BUR 250c Resting Electrocardiograph:

Versions 2.1.2 and prior; ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph:

Versions 2.2.0 and prior.
Published: 2025-02-07
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Hillrom has released software updates for all impacted devices to address these vulnerabilities. New product versions that mitigate these vulnerabilities are available as follows: * Welch Allyn ELI 380 Resting Electrocardiograph: available Q4 2023 * Welch Allyn ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph: available May 2022 * Welch Allyn ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: available Q4 2023 Hillrom recommends users upgrade to the latest product versions. Information on how to update these products can be found on the Hillrom disclosure page https://hillrom.com/en/responsible-disclosures/ .


Vendor Workaround

Hillrom recommends the following workarounds to help reduce risk: * Apply proper network and physical security controls. * Ensure a unique encryption key is configured for ELI Link and Cardiograph. * Where possible, use a firewall to prevent communication on Port 21 FTP service, Port 22 SSH (Secure Shell Connection), and Port 23 Telnet service.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-30947 A use of hard-coded password vulnerability may allow authentication abuse.This issue affects ELI 380 Resting Electrocardiograph: Versions 2.6.0 and prior; ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph: Versions 2.3.1 and prior; ELI 250c/BUR 250c Resting Electrocardiograph: Versions 2.1.2 and prior; ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: Versions 2.2.0 and prior.
History

Fri, 07 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Description A use of hard-coded password vulnerability may allow authentication abuse.This issue affects ELI 380 Resting Electrocardiograph: Versions 2.6.0 and prior; ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph: Versions 2.3.1 and prior; ELI 250c/BUR 250c Resting Electrocardiograph: Versions 2.1.2 and prior; ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: Versions 2.2.0 and prior.
Title Use of Hard-Coded Password Vulnerability in ELI Electrocardiograph Devices
Weaknesses CWE-259
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Baxter

Published:

Updated: 2025-02-07T18:50:58.812Z

Reserved: 2022-03-03T22:04:24.533Z

Link: CVE-2022-26388

cve-icon Vulnrichment

Updated: 2025-02-07T18:50:43.780Z

cve-icon NVD

Status : Deferred

Published: 2025-02-07T17:15:21.960

Modified: 2026-04-15T00:35:42.020

Link: CVE-2022-26388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses