First published: Fri Nov 04 2022(Updated: )
BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.
Credit: cybersecurity@bd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bd Totalys Multiprocessor Firmware | <1.71 | |
BD Totalys MultiProcessor |
This vulnerability is scheduled to be remediated in the BD Totalys MultiProcessor version 1.71 software release expected in the fourth quarter of 2022.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40263 is a vulnerability in BD Totalys MultiProcessor versions 1.70 and earlier that allows threat actors to access, modify, or delete sensitive information due to hardcoded credentials.
CVE-2022-40263 has a severity score of 7.8, which is considered high.
CVE-2022-40263 allows threat actors to exploit the hardcoded credentials in BD Totalys MultiProcessor versions 1.70 and earlier, potentially gaining unauthorized access to sensitive information.
If CVE-2022-40263 is exploited, threat actors may be able to access, modify, or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI), and personally identifiable information (PII).
To fix CVE-2022-40263, it is recommended to update BD Totalys MultiProcessor to version 1.71 or later, which addresses the hardcoded credentials vulnerability.