mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
117 lines
5.5 KiB
JSON
117 lines
5.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-43557",
|
|
"ASSIGNER": "cybersecurity@bd.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u00a0pump."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface",
|
|
"cweId": "CWE-1299"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Becton, Dickinson and Company (BD)",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "BodyGuard\u2122 Pump",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "BD BodyGuard\u2122 "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "CME BodyGuard\u2122 323 (2nd Edition)"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "CME BodyGuard\u2122 323 Color Vision (2nd Edition)"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "CME BodyGuard\u2122 323 Color Vision (3rd Edition)"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "CME BodyGuard\u2122 Twins (2nd Edition)"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability",
|
|
"refsource": "MISC",
|
|
"name": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "INTERNAL"
|
|
},
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this<br>vulnerability:<br>\u2022 Ensure physical access controls are in place and only authorized end-users have access to<br>BD BodyGuard\u2122 pumps.<br>\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.<br>\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering<br>infusions.<br>\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.<br>"
|
|
}
|
|
],
|
|
"value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this\nvulnerability:\n\u2022 Ensure physical access controls are in place and only authorized end-users have access to\nBD BodyGuard\u2122 pumps.\n\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\n\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\ninfusions.\n\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.\n"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "PHYSICAL",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |