First published: Mon Jun 29 2020(Updated: )
The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when used in conjunction with a Baxter Spectrum v8.x (model 35700BAX2), operates a Telnet service on Port 1023 with hard-coded credentials.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Sigma Spectrum Infusion System | =8.0 | |
Baxter Sigma Spectrum Infusion System | ||
Baxter Wireless Battery Module | =17 | |
Baxter Wireless Battery Module | =20d29 | |
Baxter Wireless Battery Module | =20d30 | |
Baxter Wireless Battery Module | =20d31 | |
Baxter Wireless Battery Module | =22d24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12045 has a high severity due to the exposure of hard-coded credentials and accessibility via Telnet.
CVE-2020-12045 affects the Baxter Spectrum WBM and Spectrum v8.x infusion system, allowing unauthorized access.
To mitigate CVE-2020-12045, disable the Telnet service on affected devices and implement stronger access controls.
CVE-2020-12045 affects Baxter Spectrum WBM versions 17, 20D29, 20D30, 20D31, and 22D24 when used with Baxter Spectrum v8.x.
There is currently no reported patch for CVE-2020-12045, so users should focus on disabling the vulnerable service.