{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_anesthesia_station_es_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "095129F1-9417-42F7-A797-22F62BA53945", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_anesthesia_station_es:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F3ACBB-87CA-43D2-8E32-2656BDCFEB8D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_ciisafe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB6CDD66-A0A2-4939-960F-8DE9DF2BF8A1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_ciisafe:-:*:*:*:*:*:*:*", "matchCriteriaId": "0488CEEA-9504-4619-80F2-106AF8A3E4A1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_logistics_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E7FFB91-0ACC-43DC-AFAA-DBBD1E10C21C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_logistics:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0197950-E007-4748-89B5-06A1ABA06E39", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_medbank_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E62C14F-58E7-4A40-880C-1A6E848122B4", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_medbank:-:*:*:*:*:*:*:*", "matchCriteriaId": "246A5F4B-B994-4FC4-A696-1E67E2F9971B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_medstation_4000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDEB528-0AEE-40B3-8F89-69118CDB6FF1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_medstation_4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "65167BF4-9505-4C1A-8E48-B772A74271F8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_medstation_es_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF6F4AA1-45B9-4DCB-BFA4-F6A6CA71508E", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_medstation_es:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB63AC0-5A51-494D-BDFA-BFD4B66A44D9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_medstation_es_server_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B42C105A-FADE-4B60-ABFE-51298098EA4F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_medstation_es_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "042CAB2C-F252-4769-B38B-4DEC2C8D109A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_parassist_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDB2B7D-A212-4F34-AC20-5B6B79776707", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_parassist:-:*:*:*:*:*:*:*", "matchCriteriaId": "192F2049-9575-48C2-9EF5-5CB8A2C0C65B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_rapid_rx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C9F9BE7-A22F-40C7-B88B-10FB4D7D390F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_rapid_rx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE6C17CA-3731-4214-9388-BEBFCF2509D0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_stockstation_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41030912-5C48-424A-83C1-516D82CCF762", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_stockstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "2699D945-7724-4CDA-9542-A9954D0B0BF2", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_supplycenter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1063ED97-BFB0-437D-BE94-ACA16FA1927B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_supplycenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "D619B7DE-C9A9-45FA-8A7F-DEED2838AD18", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_supplyroller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E9D58D9-2E46-49BD-B0F6-7A44236B639C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_supplyroller:-:*:*:*:*:*:*:*", "matchCriteriaId": "56199C09-6164-4E73-B868-C3FE5BC74C40", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_supplystation_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF6ACF1A-D2A7-4EB2-9098-045E66B72AA1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_supplystation:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A0B681-5D18-4D0F-B485-A90348AFD321", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_supplystation_ec_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CB7296-8A67-43A7-AC8C-09250093D500", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_supplystation_ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB2BE62-AFAC-443C-ABEB-F61D798B246B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:pyxis_supplystation_rf_auxiliary_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FC7D3CE-4742-40AD-93F0-C26488E73840", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:pyxis_supplystation_rf_auxiliary:-:*:*:*:*:*:*:*", "matchCriteriaId": "5584CAB1-0A32-4358-8CD1-F1F9AF332B0F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:bd:rowa_pouch_packaging_systems_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "150594A6-6426-4A44-A1C4-40CEE69614C2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:bd:rowa_pouch_packaging_systems:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2F707E6-6F04-45E5-BA9C-0109A34AC160", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Specific BD Pyxis\u2122 products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis\u2122 products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information."}, {"lang": "es", "value": "Unos productos espec\u00edficos de BD Pyxis\u2122 se instalaron con credenciales por defecto y actualmente pueden seguir funcionando con estas credenciales. Puede haber situaciones en las que los productos BD Pyxis\u2122 sean instalados con las mismas credenciales por defecto del sistema operativo local o con las credenciales de los servidores unidos a un dominio que pueden ser compartidas entre los distintos tipos de productos. Si es explotado, los actores de la amenaza pueden ser capaces de conseguir acceso privilegiado al sistema de archivos subyacente y podr\u00edan potencialmente explotar u conseguir acceso a ePHI u otra informaci\u00f3n confidencial"}], "id": "CVE-2022-22767", "lastModified": "2024-11-21T06:47:24.450", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cybersecurity@bd.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-06-02T14:15:35.843", "references": [{"source": "cybersecurity@bd.com", "tags": ["Vendor Advisory"], "url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials"}], "sourceIdentifier": "cybersecurity@bd.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-262"}], "source": "cybersecurity@bd.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-522"}], "source": "nvd@nist.gov", "type": "Primary"}]}