Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-12036 CVE-2020-12035 CVE-2020-12037 |
CWE-ID | CWE-319 CWE-287 CWE-259 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
PrismaFlex Hardware solutions / Medical equipment PrisMax Hardware solutions / Medical equipment |
Vendor | Baxter |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU29154
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12036
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information to a PDMS (Patient Data Management System) or an EMR (Electronic Medical Record) system. A remote attacker can gain access to sensitive data, such as treatment data.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPrismaFlex: before 8.2
PrisMax: before 3.0
External linkshttp://ics-cert.us-cert.gov/advisories/icsma-20-170-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29155
Risk: Medium
CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12035
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to improper authentication when configured to send treatment data to a PDMS or an EMR system. A remote attacker can bypass authentication process and modify treatment status information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPrismaFlex: before 8.2
PrisMax: before 3.0
External linkshttp://ics-cert.us-cert.gov/advisories/icsma-20-170-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29156
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12037
CWE-ID:
CWE-259 - Use of Hard-coded Password
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentionaly sensitive information.
The vulnerability exists due to the affected device contains a hard-coded service password that provides access to biomedical information, device settings, calibration settings, and network configurations. An authenticated attacker with physical access can use these credentials to modify device settings and calibration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPrismaFlex: before 8.2
PrisMax: before 3.0
External linkshttp://ics-cert.us-cert.gov/advisories/icsma-20-170-02
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.