• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Critical Flaw in NextGen’s Mirth Connect Could Expose Healthcare Data

You are here: Home / Cyber Security News / Critical Flaw in NextGen’s Mirth Connect Could Expose Healthcare Data

People of Mirth Connect, an open-supply info integration platform from NextGen Healthcare, are being urged to update to the latest model following the discovery of an unauthenticated remote code execution vulnerability.

Tracked as CVE-2023-43208, the vulnerability has been tackled in version 4.4.1 introduced on October 6, 2023.

“This is an easily exploitable, unauthenticated remote code execution vulnerability,” Horizon3.ai’s Naveen Sunkavally said in a Wednesday report. “Attackers would most probably exploit this vulnerability for initial obtain or to compromise sensitive health care data.”

Known as the “Swiss Military knife of health care integration,” Mirth Hook up is a cross-platform interface engine utilised in the health care field to connect and exchange facts involving disparate programs in a standardized fashion.

More technical details about the flaw have been withheld in light-weight of the simple fact that Mirth Hook up versions likely as far back as 2015/2016 have been discovered to be vulnerable to the issue.

It’s really worth noting that CVE-2023-43208 is a patch bypass for CVE-2023-37679 (CVSS score: 9.8), a critical remote command execution (RCE) vulnerability in the software program that makes it possible for attackers to execute arbitrary instructions on the hosting server.

Although CVE-2023-37679 was described by its maintainers as only influencing servers working Java 8, Horizon3.ai’s analysis found that all scenarios of Mirth Hook up, regardless of the Java edition, have been susceptible to the difficulty.

Supplied the ease with which the vulnerability can be trivially abused, coupled with the truth that the exploitation procedures are nicely acknowledged, it really is suggested to update Mirth Hook up, specially that are publicly accessible above the internet, to variation 4.4.1 as before long as attainable to mitigate opportunity threats.

Discovered this post exciting? Stick to us on Twitter  and LinkedIn to read extra exceptional material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « YoroTrooper: Researchers Warn of Kazakhstan’s Stealthy Cyber Espionage Group
Next Post: Iranian Group Tortoiseshell Launches New Wave of IMAPLoader Malware Attacks »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
  • BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
  • Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
  • CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
  • Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

Copyright © 2025 · AllTech.News, All Rights Reserved.