1.9 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
4.9 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
43.1%
This advisory was originally posted to the NCCIC Portal on January 17, 2017, and is being released to the NCCIC/ICS-CERT web site.
Becton, Dickinson and Company (BD) has identified an insufficiently protected credentials vulnerability in BDโs Alaris 8000 Point of Care (PC) unit, which provides a common user interface for programming intravenous infusions. BD has not developed a product fix to address this vulnerability, but has issued compensating controls to help reduce the risk associated with this vulnerability.
The following Alaris 8000 PC unit versions are affected:
Successful exploitation of this vulnerability may allow an unauthorized user with physical access to an affected device to access the host facilityโs wireless network authentication credentials and other sensitive technical data.
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment and specific clinical usage.
BD is a US-based company that maintains offices in multiple countries around the world.
The affected product, the Alaris 8000 PC unit, is the core of the Alaris System that provides a common user interface for programming intravenous infusions. According to BD, the Alaris 8000 PC unit is deployed across the Healthcare and Public Health sector. BD estimates that the Alaris 8000 PC unit is used worldwide.
An unauthorized user with physical access to an Alaris 8000 PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling an Alaris 8000 PC unit and accessing the deviceโs flash memory. The Alaris 8000 PC unit stores wireless network authentication credentials and other sensitive technical data on internal flash memory. Accessing the internal flash memory of the affected device would require special tools to extract data and carrying out this attack at a healthcare facility would increase the likelihood of detection.
CVE-2016-8375NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8375, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N, web site last accessed February 07, 2017.
This vulnerability could not be exploited remotely.
No known public exploits specifically target this vulnerability.
An attacker with high skill would be able to exploit this vulnerability.
BD has not developed a product fix to address the vulnerability, but has issued compensating controls to reduce the risk of exploitation. BD recommends that users apply the following compensating controls:
BD has released a security bulletin for the Alaris PC unit (PCU) model 8000, which is available at the following location:
For additional information about the identified vulnerability or BDโs compensating controls, please contact BDโs Customer Support, which is available at the following location:
<http://www.carefusion.com/customer-support/technical-support>
ICS-CERT also provides a section for security recommended practices on the ICS-CERT web page at http://ics-cert.us-cert.gov/content/recommended-practices. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Additional mitigation guidance and recommended practices are publicly available in the ICSโCERT Technical Information Paper, ICS-TIP-12-146-01BโTargeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site (http://ics-cert.us-cert.gov/).
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
www.carefusion.com/customer-support/alerts-and-notices/product-security-bulletin-for-alaris-pc-unit-model-8000
www.carefusion.com/customer-support/technical-support
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=BD%20Alaris%208000%20Insufficiently%20Protected%20Credentials%20Vulnerability+https://www.cisa.gov/news-events/ics-medical-advisories/icsma-17-017-01
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-medical-advisories/icsma-17-017-01&title=BD%20Alaris%208000%20Insufficiently%20Protected%20Credentials%20Vulnerability
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-medical-advisories/icsma-17-017-01
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-medical-advisories/icsma-17-017-01
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=BD%20Alaris%208000%20Insufficiently%20Protected%20Credentials%20Vulnerability&body=www.cisa.gov/news-events/ics-medical-advisories/icsma-17-017-01
1.9 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
4.9 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
43.1%