{ "id": "CVE-2022-26389", "sourceIdentifier": "productsecurity@baxter.com", "published": "2025-02-07T17:15:22.130", "lastModified": "2025-02-07T17:15:22.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability may allow privilege escalation.This issue affects:\u00a0\n\n * ELI 380 Resting Electrocardiograph:\n\nVersions 2.6.0 and prior;\u00a0\n * ELI 280/BUR280/MLBUR 280 Resting Electrocardiograph:\n\nVersions 2.3.1 and prior;\u00a0\n * ELI 250c/BUR 250c Resting Electrocardiograph:\u00a0Versions 2.1.2 and prior;\u00a0\n * ELI 150c/BUR 150c/MLBUR 150c Resting Electrocardiograph: \n\nVersions 2.2.0 and prior." }, { "lang": "es", "value": "Una vulnerabilidad de control de acceso inadecuado puede permitir la escalada de privilegios. Este problema afecta a: * Electrocardi\u00f3grafo en reposo ELI 380: versiones 2.6.0 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 280/BUR280/MLBUR 280: versiones 2.3.1 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 250c/BUR 250c: versiones 2.1.2 y anteriores; * Electrocardi\u00f3grafo en reposo ELI 150c/BUR 150c/MLBUR 150c: versiones 2.2.0 y anteriores." } ], "metrics": { "cvssMetricV31": [ { "source": "productsecurity@baxter.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "baseScore": 7.7, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.3 } ] }, "weaknesses": [ { "source": "productsecurity@baxter.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] } ], "references": [ { "url": "https://hillrom.com/en/responsible-disclosures/", "source": "productsecurity@baxter.com" }, { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-22-167-01", "source": "productsecurity@baxter.com" } ] }