#VU17328 Improper access control in FACSLyric


Published: 2019-01-31

Vulnerability identifier: #VU17328

Vulnerability risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2019-6517

CWE-ID: CWE-284

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
FACSLyric
Hardware solutions / Firmware

Vendor: Becton, Dickinson and Company (BD)

Description

The vulnerability allows a physical attacker to bypass security restrictions.

The vulnerability exists due to the application does not properly enforce user access control to privileged accounts. A physical attacker can gain unauthorized access to administrative level functions.

Mitigation
BD will follow-up directly with all affected users to perform remediation activities. BD will disable the administrative account for users with BD FACSLyric RUO Cell Analyzer units having the Windows 10 Pro Operating System. BD has contacted and will replace the computer workstations for affected users with the BD FACSLyric IVD Cell Analyzer units with the Windows 10 Pro Operating System.

Vulnerable software versions

FACSLyric: All versions


External links
http://ics-cert.us-cert.gov/advisories/ICSMA-19-029-02


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability