Remisol Advance running Software Version 1.12 The Normand Info Remisol Advance Data Manager collects and manages data and workflow for 128 connections (Beckman Coulter Instruments, automations, LIS &). It can also be connected to a host system.

Class I - Dangerous

What Should You Do?

  1. Check if you have this product:
    All serial numbers
  2. Do not eat it: Even if it looks and smells fine, do not consume this product.
  3. Throw it away or return it: You can return the product to the store for a full refund.
  4. Seek medical attention if needed: If you've consumed this product and feel unwell, contact your doctor immediately.
  5. Report problems: Report any issues to the FDA's Safety Reporting Portal.

⚠️ Emergency: If you experience severe symptoms after consuming this product, call 911 or Poison Control at 1-800-222-1222.

Recall Details

Company:
Normand-Info S.A.S.U.
Reason for Recall:
Results from repeated run for WBC (White Bloodcell Count), UWBC (Urine Whit Bloodcell Count) and PLT (Platelets) are deleted in RADV. Use may lead to erroneous results.
Classification:
Class I - Dangerous

Dangerous or defective products that predictably could cause serious health problems or death.

Status:
terminated

Product Information

Full Description:

Remisol Advance running Software Version 1.12 The Normand Info Remisol Advance Data Manager collects and manages data and workflow for 128 connections (Beckman Coulter Instruments, automations, LIS &). It can also be connected to a host system.

Product Codes/Lot Numbers:

All serial numbers

Official Source

Always verify recall information with the official FDA source:

View on FDA.gov

FDA Recall Number: Z-2743-2020

Related Recalls

Instructions For Use for software versions 1.5 to 1.9 did not provide sufficient instructions regarding the proper programming and testing of rules. Therefore, rules written by users that were not validated or incorrectly validated may lead to erroneous results.

Mar 22, 2021 Surgical Instruments Nationwide View Details →

A patch was released for a critical remote code execution vulnerability in remote desktop services. This vulnerability can be exploited remotely without authentication on certain operating systems. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system; then install programs; view, change, or delete data; or create new accounts with full user rights. If the vulnerability could be exploited locally, it would lock down the computer.

Aug 15, 2019 Other Medical Devices Nationwide View Details →