Users of the open-source data integration platform Mirth Connect are being urged to update to the latest version due to the discovery of a remote code execution vulnerability. The vulnerability, tracked as CVE-2023-43208, has been addressed in version 4.4.1 released on October 6, 2023. The vulnerability is described as easily exploitable and unauthenticated, posing a risk to sensitive healthcare data. Mirth Connect is a widely used interface engine in the healthcare industry for standardized data exchange. Technical details about the flaw have been withheld as versions dating back to 2015/2016 have been found to be vulnerable.
It is important to note that CVE-2023-43208 is a patch bypass for CVE-2023-37679, a critical remote command execution vulnerability in the software. Despite the maintainers claiming that CVE-2023-37679 only affects servers running Java 8, analysis has shown that all instances of Mirth Connect, regardless of the Java version, are susceptible. Given the ease of exploitation and the well-known methods of attack, it is recommended to update to Mirth Connect version 4.4.1, especially for publicly accessible instances, to mitigate potential threats.
Source link
