Количество 3
Количество 3
CVE-2022-22767
Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information.
GHSA-6qrf-f2g2-q6w9
Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information.
BDU:2022-04761
Уязвимость решений для управления лекарствами и расходными материалам Becton Dickinson (BD) Pyxis, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к электронной защищенной медицинской информации (ePHI)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-22767 Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
GHSA-6qrf-f2g2-q6w9 Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
BDU:2022-04761 Уязвимость решений для управления лекарствами и расходными материалам Becton Dickinson (BD) Pyxis, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к электронной защищенной медицинской информации (ePHI) | CVSS3: 8.8 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу