CVE-2022-43557 (GCVE-0-2022-43557)
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2025-04-23 15:47
CWE
  • CWE-1299 - Missing Protection Mechanism for Alternate Hardware Interface
Summary
The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump.
Impacted products
Vendor Product Version
Becton, Dickinson and Company (BD) BodyGuard™ Pump Version: BD BodyGuard™
Version: CME BodyGuard™ 323 (2nd Edition)
Version: CME BodyGuard™ 323 Color Vision (2nd Edition)
Version: CME BodyGuard™ 323 Color Vision (3rd Edition)
Version: CME BodyGuard™ Twins (2nd Edition)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:59.566Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-43557",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T15:46:47.466198Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T15:47:10.734Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "BodyGuard\u2122 Pump",
          "vendor": "Becton, Dickinson and Company (BD)",
          "versions": [
            {
              "status": "affected",
              "version": "BD BodyGuard\u2122 "
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 (2nd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 Color Vision (2nd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 Color Vision (3rd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 Twins (2nd Edition)"
            }
          ]
        }
      ],
      "datePublic": "2022-10-20T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u0026nbsp;(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u0026nbsp;knowledge may be able to configure or disable the pump. No electronic protected health information\u0026nbsp;(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u0026nbsp;pump."
            }
          ],
          "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u00a0pump."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1299",
              "description": "CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-27T20:05:04.787Z",
        "orgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18",
        "shortName": "BD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "BD BodyGuard\u2122 Pumps \u2013 RS-232 Interface Vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this\u003cbr\u003evulnerability:\u003cbr\u003e\u2022 Ensure physical access controls are in place and only authorized end-users have access to\u003cbr\u003eBD BodyGuard\u2122 pumps.\u003cbr\u003e\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\u003cbr\u003e\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\u003cbr\u003einfusions.\u003cbr\u003e\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.\u003cbr\u003e"
            }
          ],
          "value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this\nvulnerability:\n\u2022 Ensure physical access controls are in place and only authorized end-users have access to\nBD BodyGuard\u2122 pumps.\n\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\n\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\ninfusions.\n\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18",
    "assignerShortName": "BD",
    "cveId": "CVE-2022-43557",
    "datePublished": "2022-12-05T00:00:00.000Z",
    "dateReserved": "2022-10-20T00:00:00.000Z",
    "dateUpdated": "2025-04-23T15:47:10.734Z",
    "serial": 1,
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-43557\",\"sourceIdentifier\":\"cybersecurity@bd.com\",\"published\":\"2022-12-05T22:15:11.157\",\"lastModified\":\"2024-11-21T07:26:47.053\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u00a0pump.\"},{\"lang\":\"es\",\"value\":\"Las bombas de infusi\u00f3n BD BodyGuard\u2122 especificadas permiten el acceso a trav\u00e9s de la interfaz del puerto RS-232 (serie). Si se explotan, los actores de amenazas con acceso f\u00edsico, equipo especializado y conocimientos pueden configurar o desactivar la bomba. En la bomba no se almacena informaci\u00f3n de salud electr\u00f3nica protegida (ePHI), informaci\u00f3n de salud protegida (PHI) ni informaci\u00f3n de identificaci\u00f3n personal (PII).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cybersecurity@bd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"cybersecurity@bd.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1299\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_999-603_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093FC957-1538-4527-A3EA-6E7A0AFF5F24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_999-603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F62210B-9BE2-48B8-BE9E-8C8752EE9357\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_duo_999-903_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A820DFD-CF7C-47DA-856C-05105FCB8E4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_duo_999-903:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A27B7FC-8BC6-4D22-9378-124960097B92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_epidural_999-683_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFF5B40-E6A0-4E72-884E-62D323004AD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_epidural_999-683:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB4F922F-B7A7-4CC0-BB42-C0024CA5DB18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_pain_manager_999-803_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4BE9912-5A3E-4F58-8A03-79C74F021D2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_pain_manager_999-803:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F60BFC6-49DA-46BD-A0EA-5FF517F87747\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_t_999-103_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962F010D-A907-4191-8886-5826AC8A6E0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_t_999-103:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73117ED4-FC44-4304-B3F1-DA30D37E6D54\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_323_colorvision_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53213FF-B33A-43B6-97E4-96C3D9AB2459\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_323_colorvision:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29711249-0DFE-45B7-A546-37B216E0E184\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bd:bodyguard_121_twins_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1DB56C-C1C0-4152-B079-33065D2ABB17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:bd:bodyguard_121_twins:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE044C5-1CAE-43CC-8A99-8F2552490032\"}]}]}],\"references\":[{\"url\":\"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\",\"source\":\"cybersecurity@bd.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:59.566Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43557\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T15:46:47.466198Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-23T15:46:55.938Z\"}}], \"cna\": {\"title\": \"BD BodyGuard\\u2122 Pumps \\u2013 RS-232 Interface Vulnerability\", \"source\": {\"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-115\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-115 Authentication Bypass\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Becton, Dickinson and Company (BD)\", \"product\": \"BodyGuard\\u2122 Pump\", \"versions\": [{\"status\": \"affected\", \"version\": \"BD BodyGuard\\u2122 \"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 (2nd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 Color Vision (2nd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 Color Vision (3rd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 Twins (2nd Edition)\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2022-10-20T04:00:00.000Z\", \"references\": [{\"url\": \"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"BD recommends the following mitigations and compensating controls to reduce risk associated with this\\nvulnerability:\\n\\u2022 Ensure physical access controls are in place and only authorized end-users have access to\\nBD BodyGuard\\u2122 pumps.\\n\\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\\n\\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\\ninfusions.\\n\\u2022 Protect connected computer systems with BodyComm\\u2122 software with standard security measures.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"BD recommends the following mitigations and compensating controls to reduce risk associated with this\u003cbr\u003evulnerability:\u003cbr\u003e\\u2022 Ensure physical access controls are in place and only authorized end-users have access to\u003cbr\u003eBD BodyGuard\\u2122 pumps.\u003cbr\u003e\\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\u003cbr\u003e\\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\u003cbr\u003einfusions.\u003cbr\u003e\\u2022 Protect connected computer systems with BodyComm\\u2122 software with standard security measures.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The BD BodyGuard\\u2122 infusion pumps specified allow for access through the RS-232\\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\\u00a0pump.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The BD BodyGuard\\u2122 infusion pumps specified allow for access through the RS-232\u0026nbsp;(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u0026nbsp;knowledge may be able to configure or disable the pump. No electronic protected health information\u0026nbsp;(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u0026nbsp;pump.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1299\", \"description\": \"CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface\"}]}], \"providerMetadata\": {\"orgId\": \"2325d071-eabf-4b7b-a4ea-0819b6629a18\", \"shortName\": \"BD\", \"dateUpdated\": \"2023-10-27T20:05:04.787Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-43557\", \"state\": \"PUBLISHED\", \"serial\": 1, \"dateUpdated\": \"2025-04-23T15:47:10.734Z\", \"dateReserved\": \"2022-10-20T00:00:00.000Z\", \"assignerOrgId\": \"2325d071-eabf-4b7b-a4ea-0819b6629a18\", \"datePublished\": \"2022-12-05T00:00:00.000Z\", \"assignerShortName\": \"BD\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…