CVE-2020-12040
https://notcve.org/view.php?id=CVE-2020-12040
Sigma Spectrum Infusion System v's6.x (model 35700BAX) and Baxter Spectrum Infusion System Version(s) 8.x (model 35700BAX2) at the application layer uses an unauthenticated clear-text communication channel to send and receive system status and operational data. This could allow an attacker that has circumvented network security measures to view sensitive non-private data or to perform a man-in-the-middle attack. Sigma Spectrum Infusion System versiones v's6.x (modelo 35700BAX) y Baxter Spectrum Infusion System versiones 8.x (modelo 35700BAX2), en la capa de aplicación utilizan un canal de comunicación de texto sin cifrar no autenticado para enviar y recibir el estado del sistema y los datos operativos. Esto podría permitir a un atacante que haya eludido las medidas de seguridad de la red visualizar datos confidenciales no privados o llevar a cabo un ataque de tipo man-in-the-middle • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2020-12039
https://notcve.org/view.php?id=CVE-2020-12039
Baxter Sigma Spectrum Infusion Pumps Sigma Spectrum Infusion System v's6.x model 35700BAX & Baxter Spectrum Infusion System v's8.x model 35700BAX2 contain hardcoded passwords when physically entered on the keypad provide access to biomedical menus including device settings, view calibration values, network configuration of Sigma Spectrum WBM if installed. Baxter Sigma Spectrum Infusion Pumps Sigma Spectrum Infusion System versiones v's6.x modelo 35700BAX y Baxter Spectrum Infusion System versiones v's8.x modelo 35700BAX2, contienen contraseñas embebidas cuando se ingresan físicamente en el teclado proporcionan acceso a menús biomédicos que incluyen configuraciones de dispositivos, visualizar valores de calibración, configuración de red de Sigma Spectrum WBM si está instalado • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •
CVE-2020-12041
https://notcve.org/view.php?id=CVE-2020-12041
The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) telnet Command-Line Interface, grants access to sensitive data stored on the WBM that permits temporary configuration changes to network settings of the WBM, and allows the WBM to be rebooted. Temporary configuration changes to network settings are removed upon reboot. La Interfaz de Línea de Comandos telnet de Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24), otorga acceso a datos confidenciales almacenados en el WBM que permite cambios de configuración temporales en ajustes de red del WBM y permite que el WBM sea reiniciado. Los cambios de configuración temporales de la red son eliminados al reiniciar • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2020-12045
https://notcve.org/view.php?id=CVE-2020-12045
The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when used in conjunction with a Baxter Spectrum v8.x (model 35700BAX2), operates a Telnet service on Port 1023 with hard-coded credentials. El Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24) cuando es usado junto con un Baxter Spectrum versión v8.x (modelo 35700BAX2), opera un servicio Telnet en el Puerto 1023 con credenciales embebidas • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •
CVE-2020-12043
https://notcve.org/view.php?id=CVE-2020-12043
The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when configured for wireless networking the FTP service operating on the WBM remains operational until the WBM is rebooted. El Baxter Spectrum WBM (versiones v17, v20D29, v20D30, v20D31 y v22D24) cuando está configurado para redes inalámbricas, el servicio FTP que opera en el WBM permanece operativo hasta que el WBM es reiniciado • https://www.us-cert.gov/ics/advisories/icsma-20-170-04 • CWE-672: Operation on a Resource after Expiration or Release •