CVE-2020-25165:Authentication vulnerability in BD Alaris PC Unit and Systems Manager allows denial-of-service attacks affecting wireless capabilities.

splash
Back

Description Preview

A network session authentication vulnerability exists in BD Alaris PC Unit (Model 8015, Versions 9.33.1 and earlier) and BD Alaris Systems Manager (Versions 4.33 and earlier). This vulnerability affects the authentication process between these two systems. If exploited, attackers could perform a denial-of-service attack by modifying configuration headers of data in transit. A successful attack could cause the wireless capability of the BD Alaris PC Unit to fail, forcing the device into manual operation mode, which could potentially impact patient care in medical settings.

Overview

The vulnerability affects BD Alaris PC Unit Model 8015 (Versions 9.33.1 and earlier) and BD Alaris Systems Manager (Versions 4.33 and earlier), which are medical devices used in healthcare settings for infusion therapy. The authentication vulnerability exists in the network session between these two components. An attacker with network access could exploit this vulnerability to modify configuration data headers in transit, causing a denial-of-service condition that specifically impacts the wireless functionality of the PC Unit. When wireless capabilities are disrupted, the device must be operated manually, which could lead to operational inefficiencies and potential patient care impacts in healthcare environments.

Remediation

Users should update to the latest versions of the affected products that address this vulnerability. For BD Alaris PC Unit, update to version higher than 9.33.1, and for BD Alaris Systems Manager, update to version higher than 4.33. Until updates can be applied, healthcare facilities should:

  • Implement network segmentation to isolate medical devices from general network traffic
  • Restrict network access to these devices to only authorized personnel
  • Monitor network traffic for suspicious activities targeting these devices
  • Ensure staff are trained on manual operation procedures in case wireless capabilities are lost
  • Follow BD's specific security recommendations provided in their security advisory

References

  1. CISA ICS Medical Advisory (ICSMA-20-317-01): https://us-cert.cisa.gov/ics/advisories/icsma-20-317-01
  2. BD Alaris Security Documentation: Check manufacturer website for specific security bulletins related to this vulnerability
  3. CISA Healthcare Cybersecurity resources: https://www.cisa.gov/healthcare-and-public-health-sector

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Health Care & Social Assistance
    Health Care & Social Assistance
  2. Accommodation & Food Services
    Accommodation & Food Services
  3. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  4. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  5. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  6. Construction
    Construction
  7. Educational Services
    Educational Services
  8. Finance and Insurance
    Finance and Insurance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database