CVE-2020-12048

Phoenix Hemodialysis Delivery System SW 3.36 and 3.40, The Phoenix Hemodialysis device does not support data-in-transit encryption (e.g., TLS/SSL) when transmitting treatment and prescription data on the network between the Phoenix system and the Exalis dialysis data management tool. An attacker with access to the network could observe sensitive treatment and prescription data sent between the Phoenix system and the Exalis tool.
References
Link Resource
https://www.us-cert.gov/ics/advisories/icsma-20-170-03 Third Party Advisory US Government Resource
https://www.us-cert.gov/ics/advisories/icsma-20-170-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:baxter:phoenix_x36_firmware:3.36:*:*:*:*:*:*:*
cpe:2.3:o:baxter:phoenix_x36_firmware:3.40:*:*:*:*:*:*:*
cpe:2.3:h:baxter:phoenix_x36:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://www.us-cert.gov/ics/advisories/icsma-20-170-03 - Third Party Advisory, US Government Resource () https://www.us-cert.gov/ics/advisories/icsma-20-170-03 - Third Party Advisory, US Government Resource

Information

Published : 2020-06-29 14:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12048

Mitre link : CVE-2020-12048

CVE.ORG link : CVE-2020-12048


JSON object : View

Products Affected

baxter

  • phoenix_x36
  • phoenix_x36_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information