CVE-2022-43557 (GCVE-0-2022-43557)
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2025-04-23 15:47
CWE
  • CWE-1299 - Missing Protection Mechanism for Alternate Hardware Interface
Summary
The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump.
Impacted products
Vendor Product Version
Becton, Dickinson and Company (BD) BodyGuard™ Pump Version: BD BodyGuard™
Version: CME BodyGuard™ 323 (2nd Edition)
Version: CME BodyGuard™ 323 Color Vision (2nd Edition)
Version: CME BodyGuard™ 323 Color Vision (3rd Edition)
Version: CME BodyGuard™ Twins (2nd Edition)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:59.566Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-43557",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T15:46:47.466198Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T15:47:10.734Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "BodyGuard\u2122 Pump",
          "vendor": "Becton, Dickinson and Company (BD)",
          "versions": [
            {
              "status": "affected",
              "version": "BD BodyGuard\u2122 "
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 (2nd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 Color Vision (2nd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 323 Color Vision (3rd Edition)"
            },
            {
              "status": "affected",
              "version": "CME BodyGuard\u2122 Twins (2nd Edition)"
            }
          ]
        }
      ],
      "datePublic": "2022-10-20T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u0026nbsp;(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u0026nbsp;knowledge may be able to configure or disable the pump. No electronic protected health information\u0026nbsp;(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u0026nbsp;pump."
            }
          ],
          "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u00a0pump."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1299",
              "description": "CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-27T20:05:04.787Z",
        "orgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18",
        "shortName": "BD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "BD BodyGuard\u2122 Pumps \u2013 RS-232 Interface Vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this\u003cbr\u003evulnerability:\u003cbr\u003e\u2022 Ensure physical access controls are in place and only authorized end-users have access to\u003cbr\u003eBD BodyGuard\u2122 pumps.\u003cbr\u003e\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\u003cbr\u003e\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\u003cbr\u003einfusions.\u003cbr\u003e\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.\u003cbr\u003e"
            }
          ],
          "value": "BD recommends the following mitigations and compensating controls to reduce risk associated with this\nvulnerability:\n\u2022 Ensure physical access controls are in place and only authorized end-users have access to\nBD BodyGuard\u2122 pumps.\n\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\n\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\ninfusions.\n\u2022 Protect connected computer systems with BodyComm\u2122 software with standard security measures.\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2325d071-eabf-4b7b-a4ea-0819b6629a18",
    "assignerShortName": "BD",
    "cveId": "CVE-2022-43557",
    "datePublished": "2022-12-05T00:00:00.000Z",
    "dateReserved": "2022-10-20T00:00:00.000Z",
    "dateUpdated": "2025-04-23T15:47:10.734Z",
    "serial": 1,
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:59.566Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43557\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T15:46:47.466198Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-23T15:46:55.938Z\"}}], \"cna\": {\"title\": \"BD BodyGuard\\u2122 Pumps \\u2013 RS-232 Interface Vulnerability\", \"source\": {\"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-115\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-115 Authentication Bypass\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Becton, Dickinson and Company (BD)\", \"product\": \"BodyGuard\\u2122 Pump\", \"versions\": [{\"status\": \"affected\", \"version\": \"BD BodyGuard\\u2122 \"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 (2nd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 Color Vision (2nd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 323 Color Vision (3rd Edition)\"}, {\"status\": \"affected\", \"version\": \"CME BodyGuard\\u2122 Twins (2nd Edition)\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2022-10-20T04:00:00.000Z\", \"references\": [{\"url\": \"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"BD recommends the following mitigations and compensating controls to reduce risk associated with this\\nvulnerability:\\n\\u2022 Ensure physical access controls are in place and only authorized end-users have access to\\nBD BodyGuard\\u2122 pumps.\\n\\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\\n\\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\\ninfusions.\\n\\u2022 Protect connected computer systems with BodyComm\\u2122 software with standard security measures.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"BD recommends the following mitigations and compensating controls to reduce risk associated with this\u003cbr\u003evulnerability:\u003cbr\u003e\\u2022 Ensure physical access controls are in place and only authorized end-users have access to\u003cbr\u003eBD BodyGuard\\u2122 pumps.\u003cbr\u003e\\u2022 Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\u003cbr\u003e\\u2022 Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\u003cbr\u003einfusions.\u003cbr\u003e\\u2022 Protect connected computer systems with BodyComm\\u2122 software with standard security measures.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The BD BodyGuard\\u2122 infusion pumps specified allow for access through the RS-232\\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\\u00a0pump.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The BD BodyGuard\\u2122 infusion pumps specified allow for access through the RS-232\u0026nbsp;(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u0026nbsp;knowledge may be able to configure or disable the pump. No electronic protected health information\u0026nbsp;(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u0026nbsp;pump.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1299\", \"description\": \"CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface\"}]}], \"providerMetadata\": {\"orgId\": \"2325d071-eabf-4b7b-a4ea-0819b6629a18\", \"shortName\": \"BD\", \"dateUpdated\": \"2023-10-27T20:05:04.787Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-43557\", \"state\": \"PUBLISHED\", \"serial\": 1, \"dateUpdated\": \"2025-04-23T15:47:10.734Z\", \"dateReserved\": \"2022-10-20T00:00:00.000Z\", \"assignerOrgId\": \"2325d071-eabf-4b7b-a4ea-0819b6629a18\", \"datePublished\": \"2022-12-05T00:00:00.000Z\", \"assignerShortName\": \"BD\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…