Vulnerabilites related to baxter - em1200
var-202006-0365
Vulnerability from variot
Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 Includes a vulnerability in the transmission of important information in clear text.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter.
Baxter ExactaMix EM2400 and EM1200 have an information disclosure vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0365", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007459" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1268" } ], "trust": 0.6 }, "cve": "CVE-2020-12008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12008", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007459", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-57123", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12008", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007459", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12008", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-007459", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-57123", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202006-1268", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 Includes a vulnerability in the transmission of important information in clear text.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter. \n\r\n\r\nBaxter ExactaMix EM2400 and EM1200 have an information disclosure vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2020-12008" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNVD", "id": "CNVD-2020-57123" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2020-12008", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007459", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-57123", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47296", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1268", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "id": "VAR-202006-0365", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" } ] }, "last_update_date": "2024-11-23T21:02:13.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and EM1200 information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/236719" }, { "title": "Baxter ExactaMix EM2400 and ExactaMix EM1200 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=122014" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNNVD", "id": "CNNVD-202006-1268" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12008" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12008" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47296" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57123" }, { "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "db": "NVD", "id": "CVE-2020-12008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57123" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "date": "2020-06-29T14:15:10.973000", "db": "NVD", "id": "CVE-2020-12008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57123" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007459" }, { "date": "2020-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1268" }, { "date": "2024-11-21T04:59:06.317000", "db": "NVD", "id": "CVE-2020-12008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1268" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM1200 Vulnerability in plaintext transmission of important information in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007459" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1268" } ], "trust": 0.6 } }
var-202006-1810
Vulnerability from variot
Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI. Baxter ExactaMix EM 2400 and EM1200 Exists in a vulnerability related to lack of authentication.Information may be obtained and tampered with. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter.
Baxter ExactaMix EM2400 and EM1200 have an access control error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1810", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.4" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.5" }, { "model": "exactamix em2400", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.14" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.4" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.14" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.13" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.5" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.13" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007462" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1261" } ], "trust": 0.6 }, "cve": "CVE-2020-12024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-12024", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007462", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-57121", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2020-12024", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007462", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12024", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-007462", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-57121", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202006-1261", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI. Baxter ExactaMix EM 2400 and EM1200 Exists in a vulnerability related to lack of authentication.Information may be obtained and tampered with. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter. \n\r\n\r\nBaxter ExactaMix EM2400 and EM1200 have an access control error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2020-12024" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNVD", "id": "CNVD-2020-57121" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2020-12024", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007462", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-57121", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47291", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1261", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "id": "VAR-202006-1810", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" } ] }, "last_update_date": "2024-11-23T20:41:58.325000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and EM1200 access control error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/236713" }, { "title": "Baxter ExactaMix EM2400 and EM1200 Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=122009" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNNVD", "id": "CNNVD-202006-1261" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-284", "trust": 1.0 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-862", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12024" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12024" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47291" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57121" }, { "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "db": "NVD", "id": "CVE-2020-12024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57121" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "date": "2020-06-29T14:15:11.270000", "db": "NVD", "id": "CVE-2020-12024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57121" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007462" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1261" }, { "date": "2024-11-21T04:59:08.123000", "db": "NVD", "id": "CVE-2020-12024" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM1200 Vulnerability regarding lack of authentication in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007462" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1261" } ], "trust": 0.6 } }
var-202006-0368
Vulnerability from variot
Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 have hard-coded administrative account credentials for the ExactaMix operating system. Successful exploitation of this vulnerability may allow an attacker who has gained unauthorized access to system resources, including access to execute software or to view/update files, directories, or system configuration. This could allow an attacker with network access to view sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter, USA.
There is a trust management vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200. The vulnerability is caused by the use of hard-coded credentials in the management account of the ExactaMix operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.4" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.5" }, { "model": "exactamix em2400", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.14" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.4" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.14" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.13" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.5" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.13" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007460" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1274" } ], "trust": 0.6 }, "cve": "CVE-2020-12016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-12016", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-007460", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-21075", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12016", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007460", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12016", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-007460", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-21075", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1274", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 have hard-coded administrative account credentials for the ExactaMix operating system. Successful exploitation of this vulnerability may allow an attacker who has gained unauthorized access to system resources, including access to execute software or to view/update files, directories, or system configuration. This could allow an attacker with network access to view sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter, USA. \n\r\n\r\nThere is a trust management vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200. The vulnerability is caused by the use of hard-coded credentials in the management account of the ExactaMix operating system", "sources": [ { "db": "NVD", "id": "CVE-2020-12016" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNVD", "id": "CNVD-2021-21075" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2020-12016", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007460", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-21075", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47290", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1274", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "id": "VAR-202006-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" } ] }, "last_update_date": "2024-11-23T21:25:03.852000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and ExactaMix EM1200 Trust Management Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/254331" }, { "title": "Baxter ExactaMix EM2400 and ExactaMix EM1200 Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123424" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNNVD", "id": "CNNVD-202006-1274" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 }, { "problemtype": "CWE-259", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12016" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12016" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47290" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-21075" }, { "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "db": "NVD", "id": "CVE-2020-12016" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-21075" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "date": "2020-06-29T14:15:11.130000", "db": "NVD", "id": "CVE-2020-12016" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-21075" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007460" }, { "date": "2020-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1274" }, { "date": "2024-11-21T04:59:07.260000", "db": "NVD", "id": "CVE-2020-12016" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1274" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM1200 Vulnerability in using hard-coded credentials in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007460" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1274" } ], "trust": 0.6 } }
var-202006-0367
Vulnerability from variot
Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter, USA.
There is a trust management vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200. The vulnerability stems from the fact that the ExactaMix application uses hard-coded management account credentials
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.4" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.4" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.14" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.13" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.5" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em1200", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.5" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.13" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.14" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007409" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1270" } ], "trust": 0.6 }, "cve": "CVE-2020-12012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-12012", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007409", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2021-21074", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2020-12012", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007409", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12012", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-007409", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-21074", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202006-1270", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter, USA. \n\r\n\r\nThere is a trust management vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200. The vulnerability stems from the fact that the ExactaMix application uses hard-coded management account credentials", "sources": [ { "db": "NVD", "id": "CVE-2020-12012" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNVD", "id": "CNVD-2021-21074" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2020-12012", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007409", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-21074", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47276", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1270", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "id": "VAR-202006-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" } ] }, "last_update_date": "2024-11-23T20:46:45.378000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and ExactaMix EM1200 Trust Management Vulnerability (CNVD-2021-21074)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/254336" }, { "title": "Baxter ExactaMix EM2400 and EM1200 Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123263" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNNVD", "id": "CNNVD-202006-1270" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 }, { "problemtype": "CWE-259", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12012" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12012" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47276" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-21074" }, { "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "db": "NVD", "id": "CVE-2020-12012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-21074" }, { "date": "2020-08-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "date": "2020-06-29T14:15:11.053000", "db": "NVD", "id": "CVE-2020-12012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-21074" }, { "date": "2020-08-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007409" }, { "date": "2020-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1270" }, { "date": "2024-11-21T04:59:06.800000", "db": "NVD", "id": "CVE-2020-12012" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM 1200 Vulnerability in using hard-coded credentials in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007409" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1270" } ], "trust": 0.6 } }
var-202006-0372
Vulnerability from variot
Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user. Baxter ExactaMix EM 2400 and EM1200 Exists in a vulnerability related to the leakage of resources to the wrong area.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter.
There is a security vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0372", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.4" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.4" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.13" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.13" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007461" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1255" } ], "trust": 0.6 }, "cve": "CVE-2020-12020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-12020", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007461", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CNVD-2020-57120", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2020-12020", "impactScore": 4.2, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007461", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12020", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-007461", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-57120", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202006-1255", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user. Baxter ExactaMix EM 2400 and EM1200 Exists in a vulnerability related to the leakage of resources to the wrong area.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter. \n\r\n\r\nThere is a security vulnerability in Baxter ExactaMix EM2400 and ExactaMix EM1200", "sources": [ { "db": "NVD", "id": "CVE-2020-12020" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNVD", "id": "CNVD-2020-57120" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2020-12020", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007461", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-57120", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47275", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1255", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "id": "VAR-202006-0372", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" } ] }, "last_update_date": "2024-11-23T20:59:17.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and EM1200 information disclosure vulnerability (CNVD-2020-57120)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/236710" }, { "title": "Baxter ExactaMix EM2400 and ExactaMix EM1200 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=122003" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNNVD", "id": "CNNVD-202006-1255" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12020" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12020" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47275" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57120" }, { "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "db": "NVD", "id": "CVE-2020-12020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57120" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "date": "2020-06-29T14:15:11.210000", "db": "NVD", "id": "CVE-2020-12020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57120" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007461" }, { "date": "2020-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1255" }, { "date": "2024-11-21T04:59:07.700000", "db": "NVD", "id": "CVE-2020-12020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1255" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM1200 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007461" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1255" } ], "trust": 0.6 } }
var-202006-1809
Vulnerability from variot
Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 There is a vulnerability in the lack of encryption of critical data.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter.
Baxter ExactaMix EM2400 and EM1200 have encryption vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1809", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.1" }, { "model": "exactamix em1200", "scope": "eq", "trust": 1.4, "vendor": "baxter", "version": "1.2" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.1" }, { "model": "em1200", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.2" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.10" }, { "model": "em2400", "scope": "eq", "trust": 1.0, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.10" }, { "model": "exactamix em2400", "scope": "eq", "trust": 0.8, "vendor": "baxter", "version": "1.11" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.10" }, { "model": "exactamix em", "scope": "eq", "trust": 0.6, "vendor": "baxter", "version": "24001.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:baxter:em1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:baxter:em2400_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007463" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1264" } ], "trust": 0.6 }, "cve": "CVE-2020-12032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12032", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007463", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-57122", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12032", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007463", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12032", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-007463", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-57122", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202006-1264", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI. Baxter ExactaMix EM 2400 and EM1200 There is a vulnerability in the lack of encryption of critical data.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Baxter ExactaMix EM2400 and ExactaMix EM1200 are both an automated drug mixing system of Baxter. \n\r\n\r\nBaxter ExactaMix EM2400 and EM1200 have encryption vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2020-12032" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNVD", "id": "CNVD-2020-57122" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12032", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSMA-20-170-01", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91499991", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007463", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-57122", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47288", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1264", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "id": "VAR-202006-1809", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" } ], "trust": 1.3916666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" } ] }, "last_update_date": "2024-11-23T20:01:36.363000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.baxter.com/" }, { "title": "Patch for Baxter ExactaMix EM2400 and EM1200 encryption issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/236716" }, { "title": "Baxter ExactaMix EM2400 and EM1200 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123422" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNNVD", "id": "CNNVD-202006-1264" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-311", "trust": 1.8 }, { "problemtype": "CWE-312", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12032" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12032" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsma-20-170-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91499991/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47288" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57122" }, { "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "db": "NVD", "id": "CVE-2020-12032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57122" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "date": "2020-06-29T14:15:11.333000", "db": "NVD", "id": "CVE-2020-12032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-57122" }, { "date": "2020-08-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007463" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1264" }, { "date": "2024-11-21T04:59:09.060000", "db": "NVD", "id": "CVE-2020-12032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1264" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Baxter ExactaMix EM 2400 and EM1200 Vulnerability regarding lack of encryption of critical data in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007463" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1264" } ], "trust": 0.6 } }
cve-2020-12012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "USE OF HARD-CODED PASSWORD CWE-259", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:54:53", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED PASSWORD CWE-259" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12012", "datePublished": "2020-06-29T13:54:53", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CLEARTEXT TRANSMISSION OF SENSITIVE DATA CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:53:25", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CLEARTEXT TRANSMISSION OF SENSITIVE DATA CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12008", "datePublished": "2020-06-29T13:53:25", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:51:49", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12020", "datePublished": "2020-06-29T13:51:49", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 have hard-coded administrative account credentials for the ExactaMix operating system. Successful exploitation of this vulnerability may allow an attacker who has gained unauthorized access to system resources, including access to execute software or to view/update files, directories, or system configuration. This could allow an attacker with network access to view sensitive data including PHI." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "USE OF HARD-CODED PASSWORD CWE-259", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:54:50", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 have hard-coded administrative account credentials for the ExactaMix operating system. Successful exploitation of this vulnerability may allow an attacker who has gained unauthorized access to system resources, including access to execute software or to view/update files, directories, or system configuration. This could allow an attacker with network access to view sensitive data including PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED PASSWORD CWE-259" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12016", "datePublished": "2020-06-29T13:54:50", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "IMPROPER ACCESS CONTROL CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:51:31", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER ACCESS CONTROL CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12024", "datePublished": "2020-06-29T13:51:31", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:58.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12032
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Baxter ExactaMix EM 2400 & EM 1200 |
Version: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "MISSING ENCRYPTION OF SENSITIVE DATA CWE-311", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-29T13:53:23", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Baxter ExactaMix EM 2400 \u0026 EM 1200", "version": { "version_data": [ { "version_value": "ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "MISSING ENCRYPTION OF SENSITIVE DATA CWE-311" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12032", "datePublished": "2020-06-29T13:53:23", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400_firmware | 1.13 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200_firmware | 1.4 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FA3A0CC5-8628-43AB-859D-0EDD439D2C11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D218ACE-6C3F-4731-AF7B-2290D2A1AE09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user." }, { "lang": "es", "value": "Baxter ExactaMix EM 2400 Versiones 1.10, 1.11 y 1.13 y ExactaMix EM1200 Versiones 1.1, 1.2 y 1.4, no restringe que los usuarios no administrativos consigan acceso al sistema operativo y editen el script de inicio de la aplicaci\u00f3n. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede permitir a un atacante alterar el script de inicio como el usuario de acceso limitado" } ], "id": "CVE-2020-12020", "lastModified": "2024-11-21T04:59:07.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:11.210", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400_firmware | 1.13 | |
baxter | em2400_firmware | 1.14 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200_firmware | 1.4 | |
baxter | em1200_firmware | 1.5 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FA3A0CC5-8628-43AB-859D-0EDD439D2C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "0CE28A91-445B-4A86-A28E-4C79CEAB7BAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D218ACE-6C3F-4731-AF7B-2290D2A1AE09", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DDFB795-7512-4DCA-B623-63D26EFF98B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 have hard-coded administrative account credentials for the ExactaMix operating system. Successful exploitation of this vulnerability may allow an attacker who has gained unauthorized access to system resources, including access to execute software or to view/update files, directories, or system configuration. This could allow an attacker with network access to view sensitive data including PHI." }, { "lang": "es", "value": "Baxter ExactaMix EM 2400 y EM 1200, Versiones ExactaMix EM2400 Versiones 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versiones 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versiones 1.10, 1.11, 1.13, 1.14 y ExactaMix EM1200 Versiones 1.1, 1.2 , 1.4 y 1.5, poseen credenciales embebidas de cuenta administrativa para el sistema operativo de ExactaMix. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede permitir a un atacante que haya obtenido acceso no autorizado a los recursos del sistema, incluido el acceso para ejecutar software o para visualizar y actualizar archivos, directorios o la configuraci\u00f3n del sistema. Esto podr\u00eda permitir a un atacante con acceso a la red visualizar datos confidenciales, incluyendo la PHI" } ], "id": "CVE-2020-12016", "lastModified": "2024-11-21T04:59:07.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:11.130", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-259" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400_firmware | 1.13 | |
baxter | em2400_firmware | 1.14 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200_firmware | 1.4 | |
baxter | em1200_firmware | 1.5 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FA3A0CC5-8628-43AB-859D-0EDD439D2C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "0CE28A91-445B-4A86-A28E-4C79CEAB7BAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D218ACE-6C3F-4731-AF7B-2290D2A1AE09", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DDFB795-7512-4DCA-B623-63D26EFF98B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." }, { "lang": "es", "value": "Baxter ExactaMix EM 2400 versiones 1.10, 1.11, 1.13, 1.14 y ExactaMix EM1200 Versiones 1.1, 1.2, 1.4 y 1.5, no restringen el acceso a la interfaz USB de un usuario no autorizado con acceso f\u00edsico. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede permitir a un atacante con acceso f\u00edsico al sistema la capacidad de cargar una carga \u00fatil no autorizada o acceso no autorizado al disco duro mediante el arranque de un Sistema Operativo USB en vivo. Esto podr\u00eda impactar la confidencialidad e integridad del sistema y el riesgo de exposici\u00f3n de informaci\u00f3n confidencial, incluyendo la PHI" } ], "id": "CVE-2020-12024", "lastModified": "2024-11-21T04:59:08.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:11.270", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI." }, { "lang": "es", "value": "Los sistemas Baxter ExactaMix EM 2400 Versiones 1.10, 1.11 y ExactaMix EM1200 Versiones 1.1, 1.2, almacenan datos del dispositivo con informaci\u00f3n confidencial en una base de datos sin cifrar. Esto podr\u00eda permitir a un atacante con acceso a la red visualizar o modificar datos confidenciales, incluyendo la PHI" } ], "id": "CVE-2020-12032", "lastModified": "2024-11-21T04:59:09.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:11.333", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI." }, { "lang": "es", "value": "Los sistemas Baxter ExactaMix EM 2400 Versiones 1.10, 1.11 y ExactaMix EM1200 Versiones 1.1, 1.2, usan mensajes de texto sin cifrar para comunicar informaci\u00f3n de pedidos con un sistema de ingreso de pedidos. Esto podr\u00eda permitir a un atacante con acceso a la red visualizar datos confidenciales, incluyendo la PHI" } ], "id": "CVE-2020-12008", "lastModified": "2024-11-21T04:59:06.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:10.973", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsma-20-170-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
baxter | em2400_firmware | 1.10 | |
baxter | em2400_firmware | 1.11 | |
baxter | em2400_firmware | 1.13 | |
baxter | em2400_firmware | 1.14 | |
baxter | em2400 | - | |
baxter | em1200_firmware | 1.1 | |
baxter | em1200_firmware | 1.2 | |
baxter | em1200_firmware | 1.4 | |
baxter | em1200_firmware | 1.5 | |
baxter | em1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "11DFA9E3-77C8-4978-809C-D5B2EB5B7F7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "01A12E3A-C493-4696-8031-7A6C1A0FDEF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FA3A0CC5-8628-43AB-859D-0EDD439D2C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em2400_firmware:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "0CE28A91-445B-4A86-A28E-4C79CEAB7BAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "244BA6D0-A33D-419C-B532-E62C9AE45F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9FF60A-7CED-4FA3-8247-4EF8FD8BAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AC04969-E684-4D21-B889-A76DC4B54017", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D218ACE-6C3F-4731-AF7B-2290D2A1AE09", "vulnerable": true }, { "criteria": "cpe:2.3:o:baxter:em1200_firmware:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DDFB795-7512-4DCA-B623-63D26EFF98B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE1B01A-DA95-477B-95F6-43F8FD7827FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Baxter ExactaMix EM 2400 \u0026 EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI." }, { "lang": "es", "value": "Baxter ExactaMix EM 2400 y EM 1200, Versiones ExactaMix EM2400 Versiones 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versiones 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versiones 1.10, 1.11 y 1.13, y ExactaMix EM1200 Versiones 1.1, 1.2 y 1.4, poseen credenciales embebidas de cuenta administrativa para la aplicaci\u00f3n ExactaMix. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede permitir que un atacante con acceso f\u00edsico consiga acceso no autorizado para visualizar y actualizar la configuraci\u00f3n o los datos del sistema. Esto podr\u00eda afectar la confidencialidad e integridad del sistema y el riesgo de exposici\u00f3n de informaci\u00f3n confidencial, incluyendo la PHI" } ], "id": "CVE-2020-12012", "lastModified": "2024-11-21T04:59:06.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-29T14:15:11.053", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsma-20-170-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-259" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }