Phoenix Hemodialysis Delivery System SW 3.36 and 3.40, The Phoenix Hemodialysis device does not support data-in-transit encryption (e.g., TLS/SSL) when transmitting treatment and prescription data on the network between the Phoenix system and the Exalis dialysis data management tool. An attacker with access to the network could observe sensitive treatment and prescription data sent between the Phoenix system and the Exalis tool.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-03 | Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsma-20-170-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsma-20-170-03 - Third Party Advisory, US Government Resource |
Information
Published : 2020-06-29 14:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12048
Mitre link : CVE-2020-12048
CVE.ORG link : CVE-2020-12048
JSON object : View
Products Affected
baxter
- phoenix_x36
- phoenix_x36_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information