First published: Tue Mar 26 2019(Updated: )
Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 is remotely accessible via Port 22/SSH without authentication. A remote attacker may be able to make unauthorized configuration changes to the WBM, as well as issue commands to access account credentials and shared keys. Baxter asserts that this vulnerability only allows access to features and functionality on the WBM and that the SIGMA Spectrum infusion pump cannot be controlled from the WBM. Baxter has released a new version of the SIGMA Spectrum Infusion System, Version 8, which incorporates hardware and software changes.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Sigma Spectrum Infusion System | =6.05 | |
Baxter Sigma Spectrum Infusion System | ||
Baxter Wireless Battery Module | =16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5432 has a high severity due to remote access vulnerabilities that allow unauthorized modifications.
To fix CVE-2014-5432, ensure that SSH access is disabled or restricted on the Baxter SIGMA Spectrum Infusion System.
CVE-2014-5432 affects Baxter SIGMA Spectrum Infusion System version 6.05 and Wireless Battery Module version 16.
Yes, CVE-2014-5432 can be exploited remotely via Port 22/SSH without authentication, allowing attackers unauthorized access.
CVE-2014-5432 can lead to unauthorized configuration changes and command issuance on critical healthcare devices, compromising patient safety.