First published: Tue Mar 26 2019(Updated: )
Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. The hard-coded password may allow an attacker with physical access to the device to access management functions to make unauthorized configuration changes to biomedical settings such as turn on and off wireless connections and the phase-complete audible alarm that indicates the end of an infusion phase. Baxter has released a new version of the SIGMA Spectrum Infusion System, version 8, which incorporates hardware and software changes.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Sigma Spectrum Infusion System | =6.05 | |
Baxter Sigma Spectrum Infusion System | ||
Baxter Wireless Battery Module | =16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5431 is considered a high-severity vulnerability due to the existence of a hard-coded password that can expose sensitive biomedical information.
CVE-2014-5431 affects the Baxter SIGMA Spectrum Infusion System by allowing unauthorized access to device settings and network configurations through the hard-coded password.
CVE-2014-5431 specifically affects version 6.05 of the Baxter SIGMA Spectrum Infusion System.
To fix CVE-2014-5431, users should update the Baxter SIGMA Spectrum Infusion System firmware to a secure version that does not contain hard-coded passwords.
Yes, the Wireless Battery Module version 16 is also impacted by CVE-2014-5431 due to the hard-coded password vulnerability.