An issue was discovered in Becton, Dickinson and Company (BD) Alaris 8015 Point of Care (PC) unit, Version 9.5 and prior versions, and Version 9.7. An unauthorized user with physical access to an Alaris 8015 PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling an Alaris 8015 PC unit and accessing the device's flash memory. Older software versions of the Alaris 8015 PC unit, Version 9.5 and prior versions, store wireless network authentication credentials and other sensitive technical data on the affected device's removable flash memory. Being able to remove the flash memory from the affected device reduces the risk of detection, allowing an attacker to extract stored data at the attacker's convenience.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96116 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-02 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2017-02-13T22:00:00
Updated: 2017-02-14T10:57:01
Reserved: 2016-11-16T00:00:00
Link: CVE-2016-9355
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-02-13T22:59:00.240
Modified: 2017-03-16T17:08:35.180
Link: CVE-2016-9355
JSON object: View
Redhat Information
No data.
CWE