#VU61015 Use of hard-coded credentials in Becton, Dickinson and Company (BD) Hardware solutions


Published: 2022-03-04

Vulnerability identifier: #VU61015

Vulnerability risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-22766

CWE-ID: CWE-798

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Pyxis Anesthesia Station ES
Hardware solutions / Medical equipment
Pyxis Anesthesia Station 4000
Hardware solutions / Medical equipment
Pyxis CATO
Hardware solutions / Medical equipment
Pyxis CIISafe
Hardware solutions / Medical equipment
Pyxis Inventory Connect
Hardware solutions / Medical equipment
Pyxis IV Prep
Hardware solutions / Medical equipment
Pyxis JITrBUD
Hardware solutions / Medical equipment
Pyxis KanBan RF
Hardware solutions / Medical equipment
Pyxis Logistics
Hardware solutions / Medical equipment
Pyxis Med Link Family
Hardware solutions / Medical equipment
Pyxis MedBank
Hardware solutions / Medical equipment
Pyxis MedStation 4000
Hardware solutions / Medical equipment
Pyxis MedStation ES
Hardware solutions / Medical equipment
Pyxis MedStation ES Server
Hardware solutions / Medical equipment
Pyxis ParAssist
Hardware solutions / Medical equipment
Pyxis PharmoPack
Hardware solutions / Medical equipment
Pyxis ProcedureStation (including EC)
Hardware solutions / Medical equipment
Pyxis Rapid Rx
Hardware solutions / Medical equipment
Pyxis StockStation
Hardware solutions / Medical equipment
Pyxis SupplyCenter
Hardware solutions / Medical equipment
Pyxis SupplyRoller
Hardware solutions / Medical equipment
Pyxis SupplyStation (including RF, EC, CP)
Hardware solutions / Medical equipment
Pyxis Track and Deliver
Hardware solutions / Medical equipment
Rowa Pouch Packaging Systems
Hardware solutions / Medical equipment

Vendor: Becton, Dickinson and Company (BD)

Description

The vulnerability allows a local user to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local user can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Pyxis Anesthesia Station ES: All versions

Pyxis Anesthesia Station 4000: All versions

Pyxis CATO: All versions

Pyxis CIISafe: All versions

Pyxis Inventory Connect: All versions

Pyxis IV Prep: All versions

Pyxis JITrBUD: All versions

Pyxis KanBan RF: All versions

Pyxis Logistics: All versions

Pyxis Med Link Family: All versions

Pyxis MedBank: All versions

Pyxis MedStation 4000: All versions

Pyxis MedStation ES: All versions

Pyxis MedStation ES Server: All versions

Pyxis ParAssist: All versions

Pyxis PharmoPack: All versions

Pyxis ProcedureStation (including EC): All versions

Pyxis Rapid Rx: All versions

Pyxis StockStation: All versions

Pyxis SupplyCenter: All versions

Pyxis SupplyRoller: All versions

Pyxis SupplyStation (including RF, EC, CP): All versions

Pyxis Track and Deliver: All versions

Rowa Pouch Packaging Systems: All versions


External links
http://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products---hardcoded-credentials
http://www.cisa.gov/uscert/ics/advisories/icsma-22-062-01


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability