Product Security Bulletin for Third-Party ESET Legacy Startup Issue
BD is aware of and is currently monitoring a third-party application issue within ESET Security’s products, where their kernel validates a previously expired certificate (expired February 7, 2020). Please note that this is not a security vulnerability and this issue cannot be exploited by an unauthorized user. Additionally, BD has not received any reports of this third-party application issue impacting BD products.
As a result of this application issue, the impacted versions of ESET Security products fail to load modules such as firewalls, Host Intrusion Prevention System (HIPS), Updated, Device Control, Web and Email protection, causing these modules to not function. This third-party security issue, which ESET corrected with their latest security update, is not specific to BD or our products.
BD utilizes the following three ESET Security products:
For a full list of impacted ESET Security Products please see ESET’s advisory.
BD is currently working to test and validate the security update, released by ESET, for BD products that use the affected third-party products. Please see the Product Security Patching website for all approved product security patching notifications. Additionally, we recommend the following compensating controls for customers using BD products that utilize the impacted ESET products:
The product list below is available to customers to help identify existing BD Products that utilize the affected ESET products. The list provided below is not comprehensive and may be updated as more products are identified. It does not indicate the patch or device status.
Customers that maintain patches independent of BD automated delivery should ensure these actions are performed as the acting responsible entity in order to maintain the correct security posture of the system(s).
BD is currently working to test and validate the patch(es) for BD products that use the affected third-party component. Please refer to Bulletins and Patches for all approved product security patching notifications. Additionally, we recommend the following compensating controls for customers using the above listed BD products that utilize affected LibSSH software:
For product- or site-specific concerns, contact your BD service representative. If you believe a BD device on your network has been impacted by this third-party vulnerability, disconnect the device from the network and contact your BD service representative immediately.