First published: Thu Sep 08 2022(Updated: )
The Baxter Spectrum WBM is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information or cause a Denial of Service (DoS) on the WBM.
Credit: productsecurity@baxter.com
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Spectrum Wireless Battery Module | =20d29 | |
Baxter Spectrum Wireless Battery Module Firmware | ||
Baxter Sigma Spectrum Infusion System Firmware | ||
Baxter Sigma Spectrum 35700bax Firmware | ||
Baxter Sigma Spectrum 35700bax2 | ||
Baxter Sigma Spectrum 35700bax2 Firmware | ||
Baxter Spectrum IQ 35700BAX3 Firmware | ||
Baxter Sigma Spectrum Infusion System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26393 has been classified as a critical vulnerability due to its potential for unauthorized memory access and Denial of Service.
To fix CVE-2022-26393, update the Baxter Spectrum Wireless Battery Module firmware to the latest version that mitigates the vulnerability.
The impacts of CVE-2022-26393 include the possibility of memory disclosure exposing sensitive information and causing a Denial of Service.
CVE-2022-26393 specifically affects the Baxter Spectrum Wireless Battery Module firmware version 20d29.
If an immediate update is not possible, limit network access to the affected devices to reduce exposure to potential attacks related to CVE-2022-26393.