Page 2 of 12 results (0.010 seconds)

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when used in conjunction with a Baxter Spectrum v8.x (model 35700BAX2), operates a Telnet service on Port 1023 with hard-coded credentials. El Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24) cuando es usado junto con un Baxter Spectrum versión v8.x (modelo 35700BAX2), opera un servicio Telnet en el Puerto 1023 con credenciales embebidas • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when configured for wireless networking the FTP service operating on the WBM remains operational until the WBM is rebooted. El Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24) cuando está configurado para redes inalámbricas, el servicio FTP que opera en el WBM permanece operativo hasta que el WBM es reiniciado • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-672: Operation on a Resource after Expiration or Release •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24), when used with a Baxter Spectrum v8.x (model 35700BAX2) in a factory-default wireless configuration enables an FTP service with hard-coded credentials. El Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24), cuando es usado con un Baxter Spectrum versión v8.x (modelo 35700BAX2), en una configuración inalámbrica predeterminada de fábrica, permite un servicio FTP con credenciales embebidas • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. The hard-coded password may allow an attacker with physical access to the device to access management functions to make unauthorized configuration changes to biomedical settings such as turn on and off wireless connections and the phase-complete audible alarm that indicates the end of an infusion phase. Baxter has released a new version of the SIGMA Spectrum Infusion System, version 8, which incorporates hardware and software changes. Baxter SIGMA Spectrum Infusion System 6.05 (modelo 35700BAX) con un módulo de batería inalámbrica (WBM), en su versión 16, contiene una contraseña embebida, lo que proporciona acceso a información biomédica básica, opciones del dispositivo limitadas y la configuración de red del WBM, si aplica. La contraseña embebida podría permitir que un atacante con acceso físico al dispositivo acceda a las funciones de gestión para hacer cambios no autorizados en la configuración a las opciones biomédicas, como encender y apagar las conexiones inalámbricas o una alarma audible que indica el final de una fase de inyección. • https://ics-cert.us-cert.gov/advisories/ICSA-15-181-01 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 is remotely accessible via Port 22/SSH without authentication. A remote attacker may be able to make unauthorized configuration changes to the WBM, as well as issue commands to access account credentials and shared keys. Baxter asserts that this vulnerability only allows access to features and functionality on the WBM and that the SIGMA Spectrum infusion pump cannot be controlled from the WBM. Baxter has released a new version of the SIGMA Spectrum Infusion System, Version 8, which incorporates hardware and software changes. Baxter SIGMA Spectrum Infusion System, en su versión 6.05 (modelo 35700BAX), con un módulo de batería inalámbrica (WBM), en su versión 16, es accesible de forma remota mediante el puerto 22/SSH sin autenticación. • https://ics-cert.us-cert.gov/advisories/ICSA-15-181-01 • CWE-287: Improper Authentication CWE-592: DEPRECATED: Authentication Bypass Issues •