First published: Tue Nov 28 2023(Updated: )
The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
Credit: cybersecurity@bd.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Bd Facschorus | =5.0 | |
Bd Facschorus | =5.1 | |
Hp Hp Z2 Tower G9 | ||
All of | ||
Any of | ||
Bd Facschorus | =3.0 | |
Bd Facschorus | =3.1 | |
Hp Hp Z2 Tower G5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29063 is a vulnerability that allows a threat actor to insert a PCI card designed for memory capture into the FACSChorus workstation.
CVE-2023-29063 allows a threat actor to insert a PCI card designed for memory capture into the FACSChorus workstation and isolate sensitive information from a dump of the workstation RAM.
CVE-2023-29063 has a severity score of 2.4, which is considered low.
To fix CVE-2023-29063, physical access to the PCI express (PCIe) slots of the FACSChorus workstation should be restricted to prevent the insertion of unauthorized PCI cards.
No, Hp Hp Z2 Tower G9 is not affected by CVE-2023-29063.