Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-29065
PUBLISHED
More InfoOfficial Page
Assigner-BD
Assigner Org ID-2325d071-eabf-4b7b-a4ea-0819b6629a18
View Known Exploited Vulnerability (KEV) details
Published At-28 Nov, 2023 | 20:35
Updated At-02 Dec, 2024 | 19:28
Rejected At-
▼CVE Numbering Authority (CNA)
Overly Permissive Access Policy

The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.

Affected Products
Vendor
Becton, Dickinson and CompanyBecton, Dickinson and Company (BD)
Product
FACSChorus
Platforms
  • Windows
  • 64 bit
Default Status
unaffected
Versions
Affected
  • From 5.0 through 5.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-277CWE-277 Insecure Inherited Permissions
Metrics
VersionBase scoreBase severityVector
3.14.1MEDIUM
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-1CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
Solutions

Configurations

Workarounds

Vulnerabilities associated with the BD FACSChorus software and workstations will be addressed in an upcoming release. This bulletin will be updated when more information is available. Please check periodically for updates. Additionally, BD recommends the following mitigations and compensating controls to reduce risk associated with these vulnerabilities. The following recommendations apply to all vulnerabilities listed in this bulletin: * Ensure physical access controls are in place and only authorized end-users have access to the BD FACSChorus Software and respective workstation. * If the BD FACSChorus workstation is connected to the local network, ensure industry standard network security policies and procedures are followed. * Administrative access to the FACSChorus software and workstation should be strictly controlled by the customer in collaboration with their local IT security policy.

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found