

When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available.Locate control system networks and remote devices behind firewalls, and isolate them from the business network.Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.
#Natus xltek update#
Natus recommends installing this update as quickly as possible on affected systems. Contact the Natus Neuro Technical support department at 1-800 387-7516 or email for more details.
#Natus xltek software#
Natus has released NeuroWorks/SleepWorks 8.5 GMA 3, a software update with security enhancements to address the vulnerabilities identified in NeuroWorks/SleepWorks 8.Ī free software update to NeuroWorks/SleepWorks 8.5 GMA 3 is available to users using NeuroWorks/SleepWorks Version 8.0, 8.1, 8.4, or 8.5.

A CVSS v3 base score of 7.5 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 OUT-OF-BOUNDS READ CWE-125ĬVE-2017-2861 has been assigned to this vulnerability. 3.2.4 OUT-OF-BOUNDS READ CWE-125ĬVE-2017-2860 has been assigned to this vulnerability. 3.2.3 OUT-OF-BOUNDS READ CWE-125Ī specially-crafted packet may cause an out-of-bounds read, which may result in a denial-of-service condition.ĬVE-2017-2858 has been assigned to this vulnerability.

3.2.2 STACK-BASED BUFFER OVERFLOW CWE-121Īn attacker may cause a buffer overflow by sending a specially-crafted packet to the affected product while the product attempts to open a file requested by the client.ĬVE-2017-2853 has been assigned to this vulnerability. The following version of Natus Xltek NeuroWorks, used in Natus Xltek EEG medical products, are affected:ģ.2 VULNERABILITY OVERVIEW 3.2.1 OUT-OF-BOUNDS READ CWE-125Ī specially-crafted packet may be able to cause an out-of-bounds read, which may result in a denial-of-service condition.ĬVE-2017-2852 has been assigned to this vulnerability.
#Natus xltek code#
Successful exploitation of these vulnerabilities require access to the Natus customer network, and could crash the device being accessed a buffer overflow condition may allow remote code execution. Vulnerabilities: Stack-Based Buffer Overflow, Out-of-Bounds Read.

