{ "CVE_data_meta": { "ASSIGNER": "productsecurity@baxter.com", "DATE_PUBLIC": "2022-09-08T22:03:00.000Z", "ID": "CVE-2022-26390", "STATE": "PUBLIC", "TITLE": "Unencrypted internal storage of security credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter Spectrum Wireless Battery Module (WBM)", "version": { "version_data": [ { "version_affected": "=", "version_name": "16", "version_value": " " }, { "version_affected": "=", "version_name": "16D38", "version_value": " " }, { "version_affected": "=", "version_name": "17", "version_value": " " }, { "version_affected": "=", "version_name": "17D19", "version_value": " " }, { "version_affected": "=", "version_name": "20D29", "version_value": " " }, { "version_affected": "=", "version_name": "20D30", "version_value": " " }, { "version_affected": "=", "version_name": "20D31", "version_value": " " }, { "version_affected": "=", "version_name": "20D32", "version_value": " " }, { "version_affected": "=", "version_name": "22D19", "version_value": " " }, { "version_affected": "=", "version_name": "22D20", "version_value": " " }, { "version_affected": "=", "version_name": "22D21", "version_value": " " }, { "version_affected": "=", "version_name": "22D22", "version_value": " " }, { "version_affected": "=", "version_name": "22D23", "version_value": " " }, { "version_affected": "=", "version_name": "22D24", "version_value": " " }, { "version_affected": "=", "version_name": "22D25", "version_value": " " }, { "version_affected": "=", "version_name": "22D26", "version_value": " " }, { "version_affected": "=", "version_name": "22D27", "version_value": " " }, { "version_affected": "=", "version_name": "22D28", "version_value": " " } ] } } ] }, "vendor_name": "Baxter" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Baxter Spectrum Wireless Battery Module (WBM) stores network credentials and PHI (only applicable to Spectrum IQ pumps using auto programming) in unencrypted form. An attacker with physical access to a device that hasn't had all data and settings erased may be able to extract sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-311 Missing Encryption of Sensitive Data" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx", "name": "https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx" } ] }, "source": { "discovery": "EXTERNAL" } }