var-201702-0080
Vulnerability from variot
An issue was discovered in Becton, Dickinson and Company (BD) Alaris 8015 Point of Care (PC) unit, Version 9.5 and prior versions, and Version 9.7, and 8000 PC unit. An unauthorized user with physical access to an affected Alaris PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling the PC unit and accessing the device's flash memory. The Alaris 8015 PC unit, Version 9.7, and the 8000 PC unit store wireless network authentication credentials and other sensitive technical data on internal flash memory. Accessing the internal flash memory of the affected device would require special tools to extract data and carrying out this attack at a healthcare facility would increase the likelihood of detection. The Alaris 8000 and 8015 PC units are at the heart of the BD Alaris system in the United States, providing a common user interface for programming intravenous fluids. An information disclosure vulnerability exists in Alaris 8000 and 8015 PC units. Attackers can exploit vulnerabilities to obtain sensitive information, leading to further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0080",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "alaris 8015 pc unit",
"scope": "eq",
"trust": 1.6,
"vendor": "bd",
"version": "9.7"
},
{
"model": "alaris 8015 pc unit",
"scope": "lte",
"trust": 1.0,
"vendor": "bd",
"version": "9.5"
},
{
"model": "alaris pc unit",
"scope": "eq",
"trust": 0.9,
"vendor": "bd",
"version": "80159.7"
},
{
"model": "alaris pc unit",
"scope": "eq",
"trust": 0.9,
"vendor": "bd",
"version": "80000"
},
{
"model": "alaris 8000 pc unit",
"scope": null,
"trust": 0.8,
"vendor": "becton dickinson and bd",
"version": null
},
{
"model": "alaris 8015 pc unit",
"scope": "lte",
"trust": 0.8,
"vendor": "becton dickinson and bd",
"version": "9.5"
},
{
"model": "alaris 8015 pc unit",
"scope": "eq",
"trust": 0.8,
"vendor": "becton dickinson and bd",
"version": "9.7"
},
{
"model": "alaris 8015 pc unit",
"scope": "eq",
"trust": 0.6,
"vendor": "bd",
"version": "9.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "alaris 8015 pc unit",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "alaris 8015 pc unit",
"version": "9.7"
}
],
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "BID",
"id": "96113"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:bd:alaris_8000_pc_unit",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:bd:alaris_8015_pc_unit",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dickinson and Company (BD),Becton",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
}
],
"trust": 0.6
},
"cve": "CVE-2016-8375",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CVE-2016-8375",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.9,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "CNVD-2017-01601",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.5,
"id": "CVE-2016-8375",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8375",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-8375",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-01601",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201702-385",
"trust": 0.6,
"value": "LOW"
},
{
"author": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2",
"trust": 0.2,
"value": "LOW"
},
{
"author": "VULMON",
"id": "CVE-2016-8375",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Becton, Dickinson and Company (BD) Alaris 8015 Point of Care (PC) unit, Version 9.5 and prior versions, and Version 9.7, and 8000 PC unit. An unauthorized user with physical access to an affected Alaris PC unit may be able to obtain unencrypted wireless network authentication credentials and other sensitive technical data by disassembling the PC unit and accessing the device\u0027s flash memory. The Alaris 8015 PC unit, Version 9.7, and the 8000 PC unit store wireless network authentication credentials and other sensitive technical data on internal flash memory. Accessing the internal flash memory of the affected device would require special tools to extract data and carrying out this attack at a healthcare facility would increase the likelihood of detection. The Alaris 8000 and 8015 PC units are at the heart of the BD Alaris system in the United States, providing a common user interface for programming intravenous fluids. An information disclosure vulnerability exists in Alaris 8000 and 8015 PC units. Attackers can exploit vulnerabilities to obtain sensitive information, leading to further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "BID",
"id": "96113"
},
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "VULMON",
"id": "CVE-2016-8375"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8375",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSMA-17-017-01",
"trust": 2.2
},
{
"db": "BID",
"id": "96113",
"trust": 2.0
},
{
"db": "ICS CERT",
"id": "ICSMA-17-017-02",
"trust": 2.0
},
{
"db": "CNVD",
"id": "CNVD-2017-01601",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSMA-17-017-02A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011",
"trust": 0.8
},
{
"db": "IVD",
"id": "4251F10A-2A51-4EE5-942D-63053EFAB9F2",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2016-8375",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"db": "BID",
"id": "96113"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"id": "VAR-201702-0080",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
}
],
"trust": 1.55
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
}
]
},
"last_update_date": "2024-11-23T22:45:46.449000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Alaris PC unit",
"trust": 0.8,
"url": "http://www.carefusion.com/our-products/infusion/infusion-system-devices/alaris-pc-unit"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsma-17-017-01"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/96113"
},
{
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsma-17-017-02"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8375"
},
{
"trust": 0.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsma-17-017-02a"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8375"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsma-17-017-02"
},
{
"trust": 0.3,
"url": "http://www.carefusion.com/our-products/infusion/infusion-system-devices/alaris-pc-unit"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/255.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"db": "BID",
"id": "96113"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"db": "BID",
"id": "96113"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-02-20T00:00:00",
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"date": "2017-02-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"date": "2017-02-07T00:00:00",
"db": "BID",
"id": "96113"
},
{
"date": "2017-04-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"date": "2017-02-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"date": "2017-02-13T22:59:00.210000",
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-02-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-01601"
},
{
"date": "2017-03-16T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8375"
},
{
"date": "2017-03-07T03:02:00",
"db": "BID",
"id": "96113"
},
{
"date": "2017-04-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008011"
},
{
"date": "2021-03-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-385"
},
{
"date": "2024-11-21T02:59:14.917000",
"db": "NVD",
"id": "CVE-2016-8375"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "96113"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alaris 8000/8015 PC units Information Disclosure Vulnerability",
"sources": [
{
"db": "IVD",
"id": "4251f10a-2a51-4ee5-942d-63053efab9f2"
},
{
"db": "CNVD",
"id": "CNVD-2017-01601"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-385"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.