First published: Fri Sep 09 2022(Updated: )
The Baxter Spectrum WBM does not perform mutual authentication with the gateway server host. This may allow an attacker to perform a man in the middle attack that modifies parameters making the network connection fail.
Credit: productsecurity@baxter.com
Affected Software | Affected Version | How to fix |
---|---|---|
Baxter Spectrum Wireless Battery Module | >=20d29<=20d32 | |
Baxter Spectrum Wireless Battery Module | =16 | |
Baxter Spectrum Wireless Battery Module | =16d38 | |
Baxter Spectrum Wireless Battery Module | =17 | |
Baxter Spectrum Wireless Battery Module | =17d19 | |
Baxter Spectrum Wireless Battery Module Firmware | ||
Baxter Sigma Spectrum Infusion System Firmware | ||
Baxter Sigma Spectrum 35700bax Firmware | ||
Baxter Sigma Spectrum 35700bax2 | ||
Baxter Sigma Spectrum 35700bax2 Firmware | ||
Baxter Spectrum IQ 35700BAX3 Firmware | ||
Baxter Sigma Spectrum Infusion System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26394 has been rated as a significant risk due to its potential for enabling man-in-the-middle attacks.
To remediate CVE-2022-26394, ensure mutual authentication is implemented between the Baxter Spectrum WBM and the gateway server.
CVE-2022-26394 affects Baxter Spectrum Wireless Battery Module firmware versions 20d29 through 20d32, and versions 16, 16d38, and 17, 17d19.
CVE-2022-26394 could allow attackers to conduct man-in-the-middle attacks, potentially compromising data integrity.
Devices using the affected versions of Baxter Spectrum Wireless Battery Module firmware are vulnerable under CVE-2022-26394.