You have successfully logged out.
Wednesday, 15 March 2023
B. Braun ensures high security standards throughout the product life cycle by using globally accepted standards. We have established processes to monitor the latest vulnerabilities, threats, or risks and will proactively implement measures as required.
Successful exploitation of these vulnerabilities could allow a sophisticated and authenticated attacker to compromise the security of the Space communication device ‘Battery Pack SP with Wi-Fi’ allowing an attacker to escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution. The exploitation requires administrative access to the device. Without knowledge of B. Braun Battery Pack SP with WiFi web server credentials and direct network access to the specific device is necessary, this cannot be exploited.
The following B. Braun products are affected:
An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module.
An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks.
CVE-2023-0888 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned, the CVSS vector string is (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/ S:U/C:N/I:H/A:N).
Tom Johnston (Cyber Security Consultant, firstname.lastname@example.org)
A software update has been released to mitigate the reported vulnerabilities:
Note: Facilities in Canada utilizing “U” versions of software should follow the U.S. version. Facilities in Canada utilizing non-“U” versions (e.g. L) should follow the global version.
Define and implement effective medical device management password policies and practices limited to authorized biomedical engineering staff. Change the default password on each WiFi Battery upon initial installation and review after any firmware update to the device. Consider implementing unique and complex passwords on each medical device. Verify that the devices are managed in a restricted network and are not accessible to the general hospital infrastructure.
During initial installation and configuration, the internal web server password management logic requires the customer to change the initial password. The password value is in control of the customer.
All facilities utilizing Battery Pack SP with WiFi should review their IT infrastructure to ensure that a network zone concept has been implemented whereby critical systems, such as infusion pumps, are housed in separate (e.g., by firewalls or VLAN) environments which are not accessible directly from the internet or by unauthorized users.
Wireless networks should be implemented using industry standard encryption and should be equipped with Intrusion Detection Systems (IDS) and/or Intrusion Prevention Systems (IPS).
Note: In some instances, standard IT security measures (e.g., blocking of ports) may limit the administrative functions of the product, but will not impact the therapy related functions of the device. Where it is necessary to reduce security measures to perform an administrative function, such actions should be temporary in nature, and the recommendations identified above reinstituted immediately upon successful completion of the function.
Please contact our global security team at email@example.com if you have any further questions, require detailed technical information, or have any other support issue concerning the security of our products and services.
If you are a B. Braun customer and need support in mitigating the abovementioned vulnerabilities, please contact your local B. Braun representative. Customers in the US contact B. Braun Technical Support by calling 800-627-PUMP or by emailing AISTechSupport@bbraunusa.com.