First published: Mon Feb 13 2017(Updated: )
An issue was discovered in Becton, Dickinson and Company (BD) Alaris 8015 Point of Care (PC) unit, Version 9.5 and prior versions, and Version 9.7. An unauthorized user with physical access to an Alaris 8015 PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling an Alaris 8015 PC unit and accessing the device's flash memory. Older software versions of the Alaris 8015 PC unit, Version 9.5 and prior versions, store wireless network authentication credentials and other sensitive technical data on the affected device's removable flash memory. Being able to remove the flash memory from the affected device reduces the risk of detection, allowing an attacker to extract stored data at the attacker's convenience.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Bd Alaris 8015 PC Unit | <=9.5 | |
Bd Alaris 8015 PC Unit | =9.7 | |
BD Alaris 8015 PCU | <=9.5 | |
BD Alaris 8015 PCU | =9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9355 has been rated as having a medium severity due to the potential for unauthorized access to sensitive credentials.
To mitigate CVE-2016-9355, update your Alaris 8015 PC unit to the latest firmware version provided by Becton, Dickinson and Company.
CVE-2016-9355 affects Becton, Dickinson and Company Alaris 8015 PC units on versions 9.5 and 9.7.
CVE-2016-9355 allows an unauthorized user with physical access to potentially extract unencrypted wireless network authentication credentials.
Yes, physical access to the Alaris 8015 PC unit is necessary to exploit CVE-2016-9355.