Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. The hard-coded password may allow an attacker with physical access to the device to access management functions to make unauthorized configuration changes to biomedical settings such as turn on and off wireless connections and the phase-complete audible alarm that indicates the end of an infusion phase. Baxter has released a new version of the SIGMA Spectrum Infusion System, version 8, which incorporates hardware and software changes.
Published 2019-03-26 16:29:00
Updated 2019-10-09 23:11:11
Source ICS-CERT
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2014-5431

0.07%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2014-5431

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
4.6
MEDIUM AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
NIST
6.8
MEDIUM CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.9
5.9
NIST

CWE ids for CVE-2014-5431

  • The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
    Assigned by: ics-cert@hq.dhs.gov (Secondary)
  • The product contains hard-coded credentials, such as a password or cryptographic key.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2014-5431

Products affected by CVE-2014-5431

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!