ESB-2017.3026 - [Appliance] Ethicon Endo-Surgery Generator: Unauthorised access - Console/physical 2017-11-29

Printable version
PGP/GPG verifiable version

Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

Advisory (ICSMA-17-332-01) Ethicon Endo-Surgery Generator G11 Vulnerability
                             29 November 2017


        AusCERT Security Bulletin Summary

Product:           Ethicon Endo-Surgery Generator
Publisher:         ICS-CERT
Operating System:  Network Appliance
Impact/Access:     Unauthorised Access -- Console/Physical
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-14018  

Original Bulletin:

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSMA-17-332-01)

Ethicon Endo-Surgery Generator G11 Vulnerability

Original release date: November 28, 2017

Legal Notice

All information products included in are provided
"as is" for informational purposes only. The Department of Homeland Security 
(DHS) does not provide any warranties of any kind regarding any information 
contained within. DHS does not endorse any commercial product or service, 
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For 
more information about TLP, see


Johnson & Johnson, the parent company of Ethicon Endo-Surgery, LLC, reported 
an improper authentication vulnerability in the Ethicon Endo-Surgery Generator
Gen11. EthiconEndo-Surgery, LLC has produced updates that mitigate this 
vulnerability in the affected product.


The following versions of the Ethicon Endo-Surgery Generator Gen11 are 

Ethicon Endo-Surgery Generator Gen11, all versions released before November 
29, 2017.


Impact to individual organizations depends on many factors that are unique to
each organization. ICS-CERT recommends that organizations evaluate the impact
of this vulnerability based on their operational environment and specific 
clinical usage.


Ethicon Endo-Surgery, LLC is a subsidiary of Johnson & Johnson and is a 
U.S.-based company that maintains offices in several countries around the 

The Ethicon Endo-Surgery Generator Gen11 is deployed across the Healthcare and
Public Health sector. This product is marketed globally.




The security authentication mechanism used between the Ethicon Endo-Surgery 
Generator Gen11 and single-patient use products can be bypassed, allowing for
unauthorized devices to be connected to the generator, which could result in a
loss of integrity or availability.

CVE-2017-14018b has been assigned to this vulnerability. A CVSS v3 base score
of 4.8 has been assigned; the CVSS vector string is 


This vulnerability cannot be exploited remotely.


No known public exploits specifically target this vulnerability.


An attacker with high skill would be able to exploit this vulnerability.


Ethicon Endo-Surgery, LLC has contacted users and initiated a field 
cybersecurity update to address the vulnerability in the Ethicon Endo-Surgery
Generator Gen11. The update will be made available on November 29, 2017. Users
with questions regarding the vulnerability or the product update are advised 
to contact their Ethicon Endo-Surgery, LLC sales representative or Ethicon 
Customer Support Center at 1-877-ETHICON.

a. CWE-287: Improper Authentication,, web site last accessed 
November 28, 2017.

b. NVD,, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

c. CVSS Calculator,, 
web site last accessed November 28, 2017.

Contact Information

For any questions related to this report, please contact ICS-CERT at:

Email: (link sends e-mail)

Toll Free: 1-877-776-7585

International Callers: (208) 526-0900

For industrial control systems security information and incident reporting:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.


« Back to bulletins