#VU47909 Use of a One-Way Hash without a Salt in B. Braun Melsungen AG products - CVE-2020-25164


Vulnerability identifier: #VU47909

Vulnerability risk: Low

CVSSv4.0: 2.1 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-25164

CWE-ID: CWE-759

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
SpaceCom
Hardware solutions / Other hardware appliances
Data module compact plus
Hardware solutions / Other hardware appliances
Battery pack with Wi-Fi
Other software / Other software solutions

Vendor: B. Braun Melsungen AG

Description

The vulnerability allows a local attacker to gain access to sensitive information on the system.

The vulnerability exists due to salt is not used for hash calculation of passwords, making it possible to decrypt passwords. A local attacker can recover user credentials of the administrative interface.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SpaceCom: U61 - L81

Data module compact plus: A10 - A11

Battery pack with Wi-Fi: U61 - L81


External links
https://ics-cert.us-cert.gov/advisories/icsma-20-296-02
https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/se...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability