CVE-2020-25166
📋 TL;DR
This vulnerability allows attackers to bypass cryptographic signature verification in B. Braun medical device firmware updates, enabling them to install malicious firmware on affected devices. It affects B. Braun SpaceCom Version L81/U61 and earlier, and Data module compactplus Versions A10 and A11, potentially compromising patient safety and device integrity in healthcare settings.
💻 Affected Systems
- B. Braun SpaceCom
- B. Braun Data module compactplus
📦 What is this software?
Spacecom by Bbraun
⚠️ Risk & Real-World Impact
Worst Case
Attackers could install malicious firmware that alters device functionality, potentially causing incorrect medical treatment delivery, data manipulation, or device failure, endangering patient lives in critical care scenarios.
Likely Case
Unauthorized firmware modifications leading to data integrity issues, device malfunction, or unauthorized access to medical systems and patient data.
If Mitigated
With proper network segmentation and access controls, impact is limited to isolated devices without affecting broader hospital networks or patient safety systems.
🎯 Exploit Status
Exploitation requires access to the device's firmware update process, which typically requires network access to the medical device management system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SpaceCom: Version L82/U62; Data module compactplus: Version A12
Vendor Advisory: https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html
Restart Required: Yes
Instructions:
1. Contact B. Braun technical support for updated firmware. 2. Schedule maintenance window for device updates. 3. Follow manufacturer's firmware update procedures. 4. Verify cryptographic signatures post-update. 5. Test device functionality before returning to clinical use.
🔧 Temporary Workarounds
Network Segmentation
allIsolate medical devices on separate VLANs with strict firewall rules to prevent unauthorized access to firmware update interfaces.
Physical Access Controls
allRestrict physical access to medical devices and their network connections to authorized personnel only.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from general hospital networks
- Monitor network traffic to/from medical devices for unauthorized firmware update attempts
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via device interface or management console: SpaceCom versions L81/U61 or earlier, or Data module compactplus versions A10/A11 are vulnerable.
Check Version:
Device-specific commands vary by model; consult B. Braun documentation for version checking procedures.
Verify Fix Applied:
Verify firmware version is updated to SpaceCom L82/U62 or Data module compactplus A12, and confirm cryptographic signature verification is functioning during test updates.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized firmware update attempts
- Failed cryptographic signature verifications
- Unexpected device reboots or reconfigurations
Network Indicators:
- Unusual network traffic to medical device management ports
- Firmware update traffic from unauthorized sources
SIEM Query:
source_ip NOT IN (authorized_management_ips) AND dest_port IN (device_management_ports) AND protocol = 'tftp' OR protocol = 'http' AND uri CONTAINS 'firmware'
🔗 References
- https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html
- https://www.cisa.gov/uscert/ics/advisories/icsma-20-296-02
- https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html
- https://www.cisa.gov/uscert/ics/advisories/icsma-20-296-02