BD communicates with our customers about cybersecurity vulnerabilities to help healthcare providers manage potential risks through awareness and guidance.
This notification provides product security information and recommendations related to a default credential security vulnerability found within specific BD Diagnostic Solutions products.
As a routine practice, BD has shared this vulnerability with the U.S. Food and Drug Administration (FDA), the U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA) and Information Sharing and Analysis Organizations (ISAOs) where BD participates.
This notification applies to:
*Note: BD Synapsys™ Informatics Solution is only in scope of this vulnerability when installed on a NUC server. BD Synapsys™ Informatics Solution installed on a customer-provided virtual machine or on the BD Kiestra™ SCU hardware is not in scope.
CVE-2024-10476 – Default credentials in specific BD Diagnostics Solutions Products – Default credentials are used in the above listed BD Diagnostic Solutions products. If exploited, threat actors may be able to access, modify or delete data, including sensitive information such as protected health information (PHI) and personally identifiable information (PII). Exploitation of this vulnerability may allow an attacker to shut down or otherwise impact the availability of the system.
The BD Diagnostic Solutions products’ default credentials are intended for use by BD technical support teams for the above-mentioned BD products within the clinical setting. A threat actor would have to compromise your local network and, in some cases, may also need to be physically present at the instrument in order to use these product service credentials.
The BD RSS platform has not been impacted by and is not in scope of this vulnerability.
To date, BD has not been made aware of any unauthorized use of these product service credentials and has received no reports of these credentials being used for unauthorized access to any BD device.
BD is authorized as a Common Vulnerability and Exposures (CVE) Numbering Authority (CNA) by the CVE® Program. As a CNA, BD is authorized to assign CVE identification numbers to newly discovered vulnerabilities in its software-enabled products, which includes using the Common Weakness Enumeration (CWE™) system to classify vulnerability types and applying the Common Vulnerability Scoring System (CVSS) to communicate vulnerability characteristics and severity.
CVSS: 8.0 (High) CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Rationale: A threat actor could exploit this vulnerability through access to an adjacent network within the clinical setting and, in some cases, may also need to be physically present at the instrument. The attack complexity is low and there are no specialized privileges or user interaction required. The scope would be unchanged. There is a high impact to confidentiality, integrity and availability.
Unauthorized access to BD instruments/systems could be used to disable instruments, corrupt or expose instrument/system databases or modify diagnostic test results. An instrument disablement can delay appropriate diagnosis and treatment. Data corruption or results tampering (where results may either be falsely positive or falsely negative) could cause incorrect diagnosis and inappropriate or absent treatment.
To date, there have been no complaints/adverse events worldwide related to this vulnerability.
BD has already communicated to customers with affected products and is working with them to update default credentials on affected products. For this vulnerability to be exploited, a threat actor will need direct access, whether logical or physical, into the clinical setting. It is recommended that customers follow best practices for maintaining strong security controls around the logical and physical environments where Diagnostic Solutions instruments are located, including:
For product- or site-specific concerns, contact your BD service representative.