CVE-2020-12040

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical vulnerability in Baxter/Sigma Spectrum Infusion Systems where the devices communicate using unauthenticated clear-text protocols. An attacker who bypasses network security could intercept or manipulate medical infusion data, potentially affecting patient safety. This affects specific infusion pump models used in healthcare settings.

💻 Affected Systems

Products:
  • Sigma Spectrum Infusion System
  • Baxter Spectrum Infusion System
Versions: Sigma Spectrum v6.x, Baxter Spectrum v8.x
Operating Systems: Embedded medical device OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects model 35700BAX (v6.x) and model 35700BAX2 (v8.x). These are medical infusion pumps used in clinical environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could perform man-in-the-middle attacks to alter medication dosage data, potentially causing patient harm or death through incorrect drug administration.

🟠

Likely Case

Attackers could intercept sensitive operational data, monitor infusion activities, or disrupt medical device communications in healthcare networks.

🟢

If Mitigated

With proper network segmentation and encryption controls, the risk reduces to unauthorized monitoring of non-critical system status data.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device but no authentication. Attack complexity is low once network access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Baxter for specific patched versions

Vendor Advisory: https://www.us-cert.gov/ics/advisories/icsma-20-170-04

Restart Required: Yes

Instructions:

1. Contact Baxter Medical for security updates 2. Apply firmware updates following manufacturer instructions 3. Validate device functionality post-update 4. Document update in medical device inventory

🔧 Temporary Workarounds

Network Segmentation

all

Isolate infusion systems on dedicated VLANs with strict access controls

Encryption Enforcement

all

Implement network-level encryption (VPN/IPsec) for all medical device communications

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate infusion systems from general hospital networks
  • Deploy network monitoring and intrusion detection specifically for medical device traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against affected models: 35700BAX (v6.x) or 35700BAX2 (v8.x)

Check Version:

Check device display or configuration interface for model and version information

Verify Fix Applied:

Verify with Baxter that device has received security updates addressing CVE-2020-12040

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized network connections to infusion system ports
  • Unusual traffic patterns to/from medical devices

Network Indicators:

  • Clear-text communications on infusion system network segments
  • Unencrypted traffic to medical device ports

SIEM Query:

source_ip IN (medical_device_ips) AND protocol = 'tcp' AND NOT encrypted = true

🔗 References

📤 Share & Export