Multiple vulnerabilities in Baxter Sigma Spectrum Infusion Pump



Published: 2022-09-09
Risk Low
Patch available NO
Number of vulnerabilities 3
CVE-ID CVE-2022-26390
CVE-2022-26392
CVE-2022-26394
CWE-ID CWE-311
CWE-134
CWE-306
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Sigma Spectrum model 35700BAX
Hardware solutions / Medical equipment

Sigma Spectrum model 35700BAX2
Hardware solutions / Medical equipment

Baxter Spectrum IQ model 35700BAX3
Hardware solutions / Medical equipment

Sigma Spectrum LVP Wireless Battery Modules
Hardware solutions / Medical equipment

Baxter Spectrum IQ LVP with Wireless Battery Modules
Hardware solutions / Medical equipment

Vendor Baxter

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Missing Encryption of Sensitive Data

EUVDB-ID: #VU67147

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-26390

CWE-ID: CWE-311 - Missing Encryption of Sensitive Data

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected application stores network credentials and patient health information (PHI) in unencrypted form. An attacker with physical access can gain unauthorized access to sensitive information on the system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Sigma Spectrum model 35700BAX: 6.0

Sigma Spectrum model 35700BAX2: 8.0

Baxter Spectrum IQ model 35700BAX3: 9.0

Sigma Spectrum LVP Wireless Battery Modules: 16 - 22D28

Baxter Spectrum IQ LVP with Wireless Battery Modules: 22D19 - 22D28

External links

http://ics-cert.us-cert.gov/advisories/icsma-22-251-01
http://www.baxter.com/sites/g/files/ebysai3896/files/2022-09/ICSMA-22-251-01.pdf


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Format string error

EUVDB-ID: #VU67148

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-26392

CWE-ID: CWE-134 - Use of Externally-Controlled Format String

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a format string error within the application messaging when in superuser mode. A remote user can read memory in the WBM and access sensitive information.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Sigma Spectrum model 35700BAX: 6.0

Sigma Spectrum model 35700BAX2: 8.0

Baxter Spectrum IQ model 35700BAX3: 9.0

Baxter Spectrum IQ LVP with Wireless Battery Modules: 22D19 - 22D28

Sigma Spectrum LVP Wireless Battery Modules: 16 - 20D32

External links

http://ics-cert.us-cert.gov/advisories/icsma-22-251-01
http://www.baxter.com/sites/g/files/ebysai3896/files/2022-09/ICSMA-22-251-01.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Missing Authentication for Critical Function

EUVDB-ID: #VU67150

Risk: Low

CVSSv3.1: 5.1 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-26394

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected application does not perform mutual authentication with the gateway server host. A remote user on the local network can perform a machine-in-the-middle attack that modifies parameters and make the network connection fail.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Sigma Spectrum model 35700BAX: 6.0

Sigma Spectrum model 35700BAX2: 8.0

Baxter Spectrum IQ model 35700BAX3: 9.0

Baxter Spectrum IQ LVP with Wireless Battery Modules: 22D19 - 22D28

Sigma Spectrum LVP Wireless Battery Modules: 16 - 20D32

External links

http://ics-cert.us-cert.gov/advisories/icsma-22-251-01
http://www.baxter.com/sites/g/files/ebysai3896/files/2022-09/ICSMA-22-251-01.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###