Third Party Vulnerability

LibSSH Authentication Bypass

Background

BD is aware of and currently monitoring a vulnerability in LibSSH library that can result in authentication bypass. This third-party vulnerability is not specific to BD or our products. BD is providing this update to let customers know which BD products could be affected by this third-party vulnerability.

  • CVE-2018-10933 - A vulnerability was found in LibSSH's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

BD has not received any reports of this vulnerability being exploited on BD products

BD products that utilize affected Wi-Fi Module Running LibSSH

The product list below identifies existing BD products that utilize in-scope LibSSH. The list may be updated as more products are identified. In addition, this list does not indicate the patch or device status. Please check back periodically for updates.

The BD products listed below are in scope for CVE-2018-10933

  • BD Alaris™ neXus GP pump v 5.0 & v 5.1 - Model: GPneXus1
  • BD Alaris™ neXus CC syringe pumps v 5.0 - Models CCneXus1 and CCneXus1-S

 

To exploit this vulnerability, a threat actor would have to first access the facility's internal network and establish an SSH connection. They then would have to craft firmware compatible with the product and install it on the device, which would require administrator privileges, and then restart the device. Any such attack would only impact the integrity of the system as there are no data exfiltration avenues, nor any reasonable means to destroy data through this attack.

  • BD Alaris™ neXus GP pump v 5.0 & v 5.1 - Model: GPneXus1

  • BD Alaris™ neXus CC syringe pumps v 5.0 - Models CCneXus1 and CCneXus1-S

Clinical Risk Assessment and Patient Safety Impact

BD is currently working to test and validate the patch(es) for BD products that use the affected third-party component. Please refer to Bulletins and Patches for all approved product security patching notifications. Additionally, we recommend the following compensating controls for customers using the above listed BD products that utilize affected LibSSH software:

  • Firewall all wireless segments: Institute a firewall between patient-critical systems and the rest of the network. This will further restrict access from outside attackers and create of firewall rules to address threats much easier to implement.
    • Ensure that the firewall restricts the critical port 2222.
  • Active Network Monitoring: Review malicious activity on the wireless network segments where the pumps reside
  • Strong Network Authentication Passwords: Use a strong password for wireless network authentication (i.e., 31 characters long, mixed mode with special characters and numbers).
  • Nursing Education: Nurses should be instructed to ignore drug library updates unless directed to implement by hospital internal resources. Unplanned drug library events without prior notification may not be valid.

Response

BD is currently working to test and validate the patch(es) for BD products that use the affected third-party component. Please refer to Bulletins and Patches for all approved product security patching notifications. Additionally, we recommend the following compensating controls for customers using the above listed BD products that utilize affected LibSSH software:

  • Firewall all wireless segments: Institute a firewall between patient-critical systems and the rest of the network. This will further restrict access from outside attackers and create of firewall rules to address threats much easier to implement.
    • Ensure that the firewall restricts the critical port 2222.
  • Active Network Monitoring: Review malicious activity on the wireless network segments where the pumps reside
  • Strong Network Authentication Passwords: Use a strong password for wireless network authentication (i.e., 31 characters long, mixed mode with special characters and numbers).
  • Nursing Education: Nurses should be instructed to ignore drug library updates unless directed to implement by hospital internal resources. Unplanned drug library events without prior notification may not be valid.

Additional Resources

For product- or site-specific concerns, contact your BD service representative. If you believe a BD device on your network has been impacted by this third-party vulnerability, disconnect the device from the network and contact your BD service representative immediately.

Chat with us
Our live chat is available between the hours of 8.30am - 5.00pm EST, Monday - Friday
×