Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00049.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Bd
Subscribe
|
Pyxis Anesthesia Station 4000
Subscribe
Pyxis Anesthesia Station 4000 Firmware
Subscribe
Pyxis Anesthesia Station Es
Subscribe
Pyxis Anesthesia Station Es Firmware
Subscribe
Pyxis Cato
Subscribe
Pyxis Cato Firmware
Subscribe
Pyxis Ciisafe
Subscribe
Pyxis Ciisafe Firmware
Subscribe
Pyxis Inventory Connect
Subscribe
Pyxis Inventory Connect Firmware
Subscribe
Pyxis Iv Prep
Subscribe
Pyxis Iv Prep Firmware
Subscribe
Pyxis Jitrbud
Subscribe
Pyxis Jitrbud Firmware
Subscribe
Pyxis Kanban Rf
Subscribe
Pyxis Kanban Rf Firmware
Subscribe
Pyxis Logistics
Subscribe
Pyxis Logistics Firmware
Subscribe
Pyxis Med Link Family
Subscribe
Pyxis Med Link Family Firmware
Subscribe
Pyxis Medbank
Subscribe
Pyxis Medbank Firmware
Subscribe
Pyxis Medstation 4000
Subscribe
Pyxis Medstation 4000 Firmware
Subscribe
Pyxis Medstation Es
Subscribe
Pyxis Medstation Es Firmware
Subscribe
Pyxis Medstation Es Server
Subscribe
Pyxis Medstation Es Server Firmware
Subscribe
Pyxis Parassist
Subscribe
Pyxis Parassist Firmware
Subscribe
Pyxis Pharmopack
Subscribe
Pyxis Pharmopack Firmware
Subscribe
Pyxis Procedurestation
Subscribe
Pyxis Procedurestation Firmware
Subscribe
Pyxis Rapid Rx
Subscribe
Pyxis Rapid Rx Firmware
Subscribe
Pyxis Stockstation
Subscribe
Pyxis Stockstation Firmware
Subscribe
Pyxis Supplycenter
Subscribe
Pyxis Supplycenter Firmware
Subscribe
Pyxis Supplyroller
Subscribe
Pyxis Supplyroller Firmware
Subscribe
Pyxis Supplystation
Subscribe
Pyxis Supplystation Firmware
Subscribe
Pyxis Track And Deliver
Subscribe
Pyxis Track And Deliver Firmware
Subscribe
Rowa Pouch Packaging Systems
Subscribe
Rowa Pouch Packaging Systems Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27909 | Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information. |
Solution
No solution given by the vendor.
Workaround
Limit physical access to the device to only authorized personnel. Tightly control management of BD Pyxis system credentials provided to authorized users. Isolate affected products in a secure VLAN or behind firewalls with restricted access that only permits communication with trusted hosts in other networks when needed. Monitor and log all network traffic attempting to reach the affected products for suspicious activity. Work with your local BD support team ensure all patching and virus definitions are up to date. The Pyxis Security Module for automated patching and virus definition management is provided to all accounts.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: BD
Published:
Updated: 2024-09-16T19:15:26.998Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22766
No data.
Status : Modified
Published: 2022-02-11T19:15:08.850
Modified: 2024-11-21T06:47:24.280
Link: CVE-2022-22766
No data.
OpenCVE Enrichment
No data.
EUVD