CVE-2022-22767 (GCVE-0-2022-22767)
Vulnerability from cvelistv5
Published
2022-06-01 16:35
Modified
2024-09-16 16:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-262 - Not Using Password Aging
Summary
Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BD Pyxis\u2122 Anesthesia ES Station", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 CIISafe", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 Logistics", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 MedBank", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 MedStation\u2122 4000", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 MedStation\u2122 ES", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 MedStation\u2122 ES Server", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 ParAssist", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 Rapid Rx", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 StockStation", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 SupplyCenter", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 SupplyRoller", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 SupplyStation\u2122", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 SupplyStation\u2122 EC", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Pyxis\u2122 SupplyStation\u2122 RF auxiliary", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "BD Rowa\u2122 Pouch Packaging Systems", "vendor": "Becton Dickinson (BD)", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "configurations": [ { "lang": "en", "value": "To exploit this vulnerability, threat actors would have to gain access to the default credentials, infiltrate facility\u2019s network, and gain access to individual devices and/or servers." } ], "datePublic": "2022-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Specific BD Pyxis\u2122 products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis\u2122 products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-262", "description": "CWE-262: Not Using Password Aging", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-01T16:35:38", "orgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18", "shortName": "BD" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials" } ], "solutions": [ { "lang": "en", "value": "BD is currently strengthening our credential management capabilities in BD Pyxis\u2122 products. Service personnel are proactively working with customers whose domain-joined server(s) credentials require updates. BD is currently piloting a credential management solution that is initially targeted for only specific BD Pyxis\u2122 product versions and will allow for improved authentication management practices with specific local operating system credentials. Changes needed for installation, upgrade or to applications are being evaluated as part of the overall remediation." } ], "source": { "discovery": "INTERNAL" }, "title": "BD Pyxis\u2122 Products \u2013 Default Credentials", "workarounds": [ { "lang": "en", "value": "Limit physical access to only authorized personnel." }, { "lang": "en", "value": "Tightly control management of system passwords provided to authorized users." }, { "lang": "en", "value": "Isolate affected products in a secure VLAN or behind firewalls with restricted access that only permits communication with trusted hosts in other networks when needed." }, { "lang": "en", "value": "Work with your local BD support team to ensure that patching and virus definitions are up to date. The BD Remote Support Services Solution for automated patching and virus definition management is an available solution for customer accounts." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@bd.com", "DATE_PUBLIC": "2022-05-31T15:00:00.000Z", "ID": "CVE-2022-22767", "STATE": "PUBLIC", "TITLE": "BD Pyxis\u2122 Products \u2013 Default Credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BD Pyxis\u2122 Anesthesia ES Station", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 CIISafe", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 Logistics", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 MedBank", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 MedStation\u2122 4000", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 MedStation\u2122 ES", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 MedStation\u2122 ES Server", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 ParAssist", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 Rapid Rx", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 StockStation", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 SupplyCenter", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 SupplyRoller", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 SupplyStation\u2122", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 SupplyStation\u2122 EC", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Pyxis\u2122 SupplyStation\u2122 RF auxiliary", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "BD Rowa\u2122 Pouch Packaging Systems", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Becton Dickinson (BD)" } ] } }, "configuration": [ { "lang": "en", "value": "To exploit this vulnerability, threat actors would have to gain access to the default credentials, infiltrate facility\u2019s network, and gain access to individual devices and/or servers." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Specific BD Pyxis\u2122 products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis\u2122 products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-262: Not Using Password Aging" } ] } ] }, "references": { "reference_data": [ { "name": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials", "refsource": "CONFIRM", "url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials" } ] }, "solution": [ { "lang": "en", "value": "BD is currently strengthening our credential management capabilities in BD Pyxis\u2122 products. Service personnel are proactively working with customers whose domain-joined server(s) credentials require updates. BD is currently piloting a credential management solution that is initially targeted for only specific BD Pyxis\u2122 product versions and will allow for improved authentication management practices with specific local operating system credentials. Changes needed for installation, upgrade or to applications are being evaluated as part of the overall remediation." } ], "source": { "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "Limit physical access to only authorized personnel." }, { "lang": "en", "value": "Tightly control management of system passwords provided to authorized users." }, { "lang": "en", "value": "Isolate affected products in a secure VLAN or behind firewalls with restricted access that only permits communication with trusted hosts in other networks when needed." }, { "lang": "en", "value": "Work with your local BD support team to ensure that patching and virus definitions are up to date. The BD Remote Support Services Solution for automated patching and virus definition management is an available solution for customer accounts." } ] } } }, "cveMetadata": { "assignerOrgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18", "assignerShortName": "BD", "cveId": "CVE-2022-22767", "datePublished": "2022-06-01T16:35:38.991672Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-16T16:42:50.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22767\",\"sourceIdentifier\":\"cybersecurity@bd.com\",\"published\":\"2022-06-02T14:15:35.843\",\"lastModified\":\"2024-11-21T06:47:24.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Specific BD Pyxis\u2122 products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis\u2122 products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information.\"},{\"lang\":\"es\",\"value\":\"Unos productos espec\u00edficos de BD Pyxis\u2122 se instalaron con credenciales por defecto y actualmente pueden seguir funcionando con estas credenciales. Puede haber situaciones en las que los productos BD Pyxis\u2122 sean instalados con las mismas credenciales por defecto del sistema operativo local o con las credenciales de los servidores unidos a un dominio que pueden ser compartidas entre los distintos tipos de productos. Si es explotado, los actores de la amenaza pueden ser capaces de conseguir acceso privilegiado al sistema de archivos subyacente y podr\u00edan potencialmente explotar u conseguir acceso a ePHI u otra informaci\u00f3n confidencial\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cybersecurity@bd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":8.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":6.5,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@bd.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-262\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_anesthesia_station_es_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"095129F1-9417-42F7-A797-22F62BA53945\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_anesthesia_station_es:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F3ACBB-87CA-43D2-8E32-2656BDCFEB8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_ciisafe_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6CDD66-A0A2-4939-960F-8DE9DF2BF8A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_ciisafe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0488CEEA-9504-4619-80F2-106AF8A3E4A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_logistics_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7FFB91-0ACC-43DC-AFAA-DBBD1E10C21C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_logistics:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0197950-E007-4748-89B5-06A1ABA06E39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_medbank_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E62C14F-58E7-4A40-880C-1A6E848122B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_medbank:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246A5F4B-B994-4FC4-A696-1E67E2F9971B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_medstation_4000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEDEB528-0AEE-40B3-8F89-69118CDB6FF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_medstation_4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65167BF4-9505-4C1A-8E48-B772A74271F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_medstation_es_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6F4AA1-45B9-4DCB-BFA4-F6A6CA71508E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_medstation_es:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB63AC0-5A51-494D-BDFA-BFD4B66A44D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_medstation_es_server_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42C105A-FADE-4B60-ABFE-51298098EA4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_medstation_es_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"042CAB2C-F252-4769-B38B-4DEC2C8D109A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_parassist_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BDB2B7D-A212-4F34-AC20-5B6B79776707\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_parassist:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192F2049-9575-48C2-9EF5-5CB8A2C0C65B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_rapid_rx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9F9BE7-A22F-40C7-B88B-10FB4D7D390F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_rapid_rx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE6C17CA-3731-4214-9388-BEBFCF2509D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_stockstation_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41030912-5C48-424A-83C1-516D82CCF762\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_stockstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2699D945-7724-4CDA-9542-A9954D0B0BF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_supplycenter_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1063ED97-BFB0-437D-BE94-ACA16FA1927B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_supplycenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D619B7DE-C9A9-45FA-8A7F-DEED2838AD18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_supplyroller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9D58D9-2E46-49BD-B0F6-7A44236B639C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_supplyroller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56199C09-6164-4E73-B868-C3FE5BC74C40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_supplystation_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6ACF1A-D2A7-4EB2-9098-045E66B72AA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_supplystation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A0B681-5D18-4D0F-B485-A90348AFD321\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_supplystation_ec_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CB7296-8A67-43A7-AC8C-09250093D500\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_supplystation_ec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB2BE62-AFAC-443C-ABEB-F61D798B246B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:pyxis_supplystation_rf_auxiliary_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FC7D3CE-4742-40AD-93F0-C26488E73840\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:pyxis_supplystation_rf_auxiliary:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5584CAB1-0A32-4358-8CD1-F1F9AF332B0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:rowa_pouch_packaging_systems_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150594A6-6426-4A44-A1C4-40CEE69614C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:rowa_pouch_packaging_systems:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F707E6-6F04-45E5-BA9C-0109A34AC160\"}]}]}],\"references\":[{\"url\":\"https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials\",\"source\":\"cybersecurity@bd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cybersecurity.bd.com/bulletins-and-patches/bd-pyxis-products-default-credentials\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…