Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Becton, Dickinson and Company (BD)

Source -

CNA

BOS Name -

Becton, Dickinson and Company

CNA CVEs -

9

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated ProductsRelated AssignersReports
9Vulnerabilities found

CVE-2023-29066
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-3.2||LOW
EPSS-0.04% / 9.88%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:36
Updated-02 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect User Management

The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders.

Action-Not Available
Vendor-Becton, Dickinson and CompanyHP Inc.
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-29065
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-4.1||MEDIUM
EPSS-0.04% / 11.90%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:35
Updated-02 Dec, 2024 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Overly Permissive Access Policy

The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.

Action-Not Available
Vendor-Becton, Dickinson and CompanyHP Inc.
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-277
Insecure Inherited Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-29064
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-4.1||MEDIUM
EPSS-0.04% / 12.07%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:35
Updated-11 Oct, 2024 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded Secrets

The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.

Action-Not Available
Vendor-Becton, Dickinson and CompanyHP Inc.
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-29063
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-2.4||LOW
EPSS-0.07% / 23.14%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:34
Updated-02 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of DMA Access Protections

The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.

Action-Not Available
Vendor-Becton, Dickinson and CompanyHP Inc.
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-1299
Missing Protection Mechanism for Alternate Hardware Interface
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-29062
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-3.8||LOW
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:34
Updated-02 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsecure Identity Verification

The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.

Action-Not Available
Vendor-Becton, Dickinson and CompanyHP Inc.
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-287
Improper Authentication
CVE-2023-29061
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 8.13%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:33
Updated-03 Jun, 2025 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of Adequate BIOS Authentication

There is no BIOS password on the FACSChorus workstation. A threat actor with physical access to the workstation can potentially exploit this vulnerability to access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication.

Action-Not Available
Vendor-HP Inc.Becton, Dickinson and Company
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-29060
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-5.4||MEDIUM
EPSS-0.05% / 15.64%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 20:07
Updated-03 Jun, 2025 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of USB Whitelisting

The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data.

Action-Not Available
Vendor-HP Inc.Becton, Dickinson and Company
Product-facschorushp_z2_tower_g5hp_z2_tower_g9FACSChorus
CWE ID-CWE-1299
Missing Protection Mechanism for Alternate Hardware Interface
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-43557
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 33.00%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BD BodyGuard™ Pumps – RS-232 Interface Vulnerability

The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump.

Action-Not Available
Vendor-Becton, Dickinson and Company
Product-bodyguard_323_colorvisionbodyguard_999-603_firmwarebodyguard_999-603bodyguard_duo_999-903_firmwarebodyguard_121_twinsbodyguard_323_colorvision_firmwarebodyguard_t_999-103_firmwarebodyguard_epidural_999-683_firmwarebodyguard_121_twins_firmwarebodyguard_pain_manager_999-803_firmwarebodyguard_pain_manager_999-803bodyguard_duo_999-903bodyguard_t_999-103bodyguard_epidural_999-683BodyGuard™ Pump
CWE ID-CWE-1299
Missing Protection Mechanism for Alternate Hardware Interface
CWE ID-CWE-287
Improper Authentication
CVE-2020-10598
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 27.02%
||
7 Day CHG~0.00%
Published-01 Apr, 2020 | 20:59
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BD Pyxis MedStation ES System v1.6.1 and Pyxis Anesthesia (PAS) ES System v1.6.1, a restricted desktop environment escape vulnerability exists in the kiosk mode functionality of affected devices. Specially crafted inputs could allow the user to escape the restricted environment, resulting in access to sensitive data.

Action-Not Available
Vendor-Becton, Dickinson and Company
Product-pyxis_anesthesia_station_es_firmwarepyxis_medstation_espyxis_medstation_es_firmwarepyxis_anesthesia_station_esPyxis MedStation ES SystemPyxis Anesthesia (PAS) ES System
CWE ID-CWE-693
Protection Mechanism Failure