CVE-2020-12016

9.8 CRITICAL

📋 TL;DR

This CVE involves hard-coded administrative credentials in Baxter ExactaMix medical devices, allowing attackers with network access to gain unauthorized system access. Successful exploitation could lead to viewing/updating sensitive files, executing software, and accessing protected health information (PHI). Affected systems include Baxter ExactaMix EM 2400 and EM 1200 devices running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Baxter ExactaMix EM 2400
  • Baxter ExactaMix EM 1200
Versions: ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14; ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5
Operating Systems: Embedded medical device OS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with these firmware versions are vulnerable by default due to hard-coded credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to PHI, modification of medical device configurations, execution of arbitrary code, and potential patient safety impacts.

🟠

Likely Case

Unauthorized access to sensitive medical data, system configuration changes, and potential disruption of medical device operations.

🟢

If Mitigated

Limited impact if devices are properly segmented and access controlled, though hard-coded credentials remain a persistent threat.

🌐 Internet-Facing: HIGH - Medical devices often have network connectivity and hard-coded credentials allow easy exploitation if exposed.
🏢 Internal Only: HIGH - Even internally, hard-coded credentials can be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hard-coded credentials make exploitation trivial once network access is obtained. No special tools or skills required beyond basic network scanning and credential testing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Baxter for updated firmware versions

Vendor Advisory: https://www.us-cert.gov/ics/advisories/icsma-20-170-01

Restart Required: Yes

Instructions:

1. Contact Baxter technical support for updated firmware. 2. Schedule maintenance window. 3. Backup device configurations. 4. Apply firmware update following Baxter's instructions. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ExactaMix devices on separate VLANs with strict firewall rules limiting access to authorized systems only.

Access Control Lists

all

Implement network ACLs to restrict which IP addresses can communicate with ExactaMix devices.

🧯 If You Can't Patch

  • Implement strict network segmentation and zero-trust principles for medical device network
  • Deploy network monitoring and intrusion detection specifically for medical device traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via device interface or contact Baxter support. Devices with listed versions are vulnerable.

Check Version:

Check via device interface or contact Baxter support for version verification procedure.

Verify Fix Applied:

Verify firmware has been updated to version not listed in affected versions. Confirm with Baxter that updated firmware addresses CVE-2020-12016.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login
  • Unauthorized access attempts to administrative interfaces
  • Unusual file access patterns

Network Indicators:

  • Unexpected network connections to/from ExactaMix devices
  • Traffic patterns indicating credential testing
  • Administrative protocol usage from unauthorized sources

SIEM Query:

source_ip IN (medical_device_subnet) AND (event_type="authentication_success" OR event_type="file_access") AND user="admin"

🔗 References

📤 Share & Export