The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32666 The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
Fixes

Solution

No solution given by the vendor.


Workaround

Vulnerabilities associated with the BD FACSChorus software and workstations will be addressed in an upcoming release. This bulletin will be updated when more information is available. Please check periodically for updates. Additionally, BD recommends the following mitigations and compensating controls to reduce risk associated with these vulnerabilities. The following recommendations apply to all vulnerabilities listed in this bulletin: * Ensure physical access controls are in place and only authorized end-users have access to the BD FACSChorus Software and respective workstation. * If the BD FACSChorus workstation is connected to the local network, ensure industry standard network security policies and procedures are followed. * Administrative access to the FACSChorus software and workstation should be strictly controlled by the customer in collaboration with their local IT security policy.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: BD

Published:

Updated: 2024-08-02T14:00:14.934Z

Reserved: 2023-03-30T21:10:17.526Z

Link: CVE-2023-29063

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-28T21:15:07.613

Modified: 2024-11-21T07:56:29.133

Link: CVE-2023-29063

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.