The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
References
Link | Resource |
---|---|
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: BD
Published: 2023-11-28T20:34:59.290Z
Updated: 2023-11-28T20:34:59.290Z
Reserved: 2023-03-30T21:10:17.526Z
Link: CVE-2023-29063
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-28T21:15:07.613
Modified: 2023-12-05T14:45:30.123
Link: CVE-2023-29063
JSON object: View
Redhat Information
No data.