In a recent report, Horizon3.ai’s Naveen Sunkavally highlighted an easily exploitable vulnerability. CVE-2023-43208 is a vulnerability in Mirth Connect, the widely-used open-source data integration platform by NextGen HealthCare.
This unauthenticated remote code execution flaw, addressed in the latest release (version 4.4.1 as of October 6, 2023), poses a significant risk to users.
What Is Mirth Connect?
Described as the “Swiss Army knife of healthcare integration,” Mirth Connect facilitates standardized communication and data exchange across diverse systems in the healthcare industry. Despite being a crucial tool, versions dating back to 2015/2016 have been found vulnerable to this flaw, prompting a critical update.
What Is CVE-2023-43208?
Importantly, CVE-2023-43208 serves as a patch bypass for CVE-2023-37679, a severe remote command execution vulnerability (CVSS score: 9.8) in Mirth Connect. Contrary to initial assessments, Horizon3.ai’s analysis revealed that all instances of Mirth Connect, regardless of Java version, are susceptible to this problem.
Given the potential risks, users, especially those with public internet accessibility, are strongly advised to update to Mirth Connect version 4.4.1 promptly. This swift action is crucial in preventing the exploitation of the vulnerability, which could lead to unauthorized access or compromise sensitive healthcare data.