First published: Fri Sep 09 2022(Updated: )
The Baxter Spectrum WBM (v16, v16D38) and Baxter Spectrum WBM (v17, v17D19, v20D29 to v20D32) when in superuser mode is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information.
Credit: productsecurity@baxter.com
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Spectrum Wireless Battery Module | >=20d29<=20d32 | |
Baxter Spectrum Wireless Battery Module | =16 | |
Baxter Spectrum Wireless Battery Module | =16d38 | |
Baxter Spectrum Wireless Battery Module | =17 | |
Baxter Spectrum Wireless Battery Module | =17d19 | |
Baxter Spectrum Wireless Battery Module Firmware | ||
Baxter Sigma Spectrum Infusion System Firmware | ||
Baxter Sigma Spectrum 35700bax Firmware | ||
Baxter Sigma Spectrum 35700bax2 | ||
Baxter Sigma Spectrum 35700bax2 Firmware | ||
Baxter Spectrum IQ 35700BAX3 Firmware | ||
Baxter Sigma Spectrum Infusion System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26392 has been classified as a critical vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2022-26392, users should update the Baxter Spectrum Wireless Battery Module firmware to the latest version available.
CVE-2022-26392 can enable format string attacks via application messaging, allowing unauthorized memory access.
CVE-2022-26392 affects Baxter Spectrum Wireless Battery Module firmware versions 16, 16D38, 17, and from 20D29 to 20D32.
CVE-2022-26392 allows an attacker to read memory of the Baxter Spectrum WBM, potentially accessing sensitive information.