All the vulnerabilites related to B. Braun - Space Battery Pack SP with Wi-Fi
cve-2023-0888
Vulnerability from cvelistv5
Published
2023-03-13 08:14
Modified
2024-08-02 05:24
Summary
Authenticated eval injection in B. Braun Space Battery pack SP with Wi-Fi
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:24:34.770Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.bbraun.com/productsecurity"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.bbraunusa.com/productsecurity"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Space Battery Pack SP with Wi-Fi",
          "vendor": "B. Braun ",
          "versions": [
            {
              "lessThanOrEqual": "053L000092",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "054U000092",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Tom Johnston"
        }
      ],
      "datePublic": "2023-03-15T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-95",
              "description": "CWE-95 Eval injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-13T08:14:32.358Z",
        "orgId": "653264ec-f98b-4e8f-b8b4-540a01b7657d",
        "shortName": "B.Braun"
      },
      "references": [
        {
          "url": "https://www.bbraun.com/productsecurity"
        },
        {
          "url": "https://www.bbraunusa.com/productsecurity"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version L93/U93 or newer solves the issue."
            }
          ],
          "value": "Update to version L93/U93 or newer solves the issue."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Authenticated eval injection in B. Braun Space Battery pack SP with Wi-Fi  ",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use secure credentials and keep them secret.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSecure your network to prevent outside access to medical devices.\u003c/span\u003e"
            }
          ],
          "value": "Use secure credentials and keep them secret.\u00a0Secure your network to prevent outside access to medical devices."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "653264ec-f98b-4e8f-b8b4-540a01b7657d",
    "assignerShortName": "B.Braun",
    "cveId": "CVE-2023-0888",
    "datePublished": "2023-03-13T08:14:32.358Z",
    "dateReserved": "2023-02-17T09:22:21.832Z",
    "dateUpdated": "2024-08-02T05:24:34.770Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}