Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-27909 | Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information. |
Solution
No solution given by the vendor.
Workaround
Limit physical access to the device to only authorized personnel. Tightly control management of BD Pyxis system credentials provided to authorized users. Isolate affected products in a secure VLAN or behind firewalls with restricted access that only permits communication with trusted hosts in other networks when needed. Monitor and log all network traffic attempting to reach the affected products for suspicious activity. Work with your local BD support team ensure all patching and virus definitions are up to date. The Pyxis Security Module for automated patching and virus definition management is provided to all accounts.
No history.

Status: PUBLISHED
Assigner: BD
Published:
Updated: 2024-09-16T19:15:26.998Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22766

No data.

Status : Modified
Published: 2022-02-11T19:15:08.850
Modified: 2024-11-21T06:47:24.280
Link: CVE-2022-22766

No data.

No data.