CVE-2014-5406

N/A Unknown
Published: July 06, 2015 Modified: November 03, 2025

Description

The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might overlap CVE-2015-3459.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm
Source: ics-cert@hq.dhs.gov
Third Party Advisory US Government Resource
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource

7 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.5%
67th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

hospira