CVE-2023-30563

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to upload malicious files through the System Manager User Import Function, which can lead to session hijacking. It affects BD Alaris System with Guardrails Suite MX users who have access to the vulnerable import function. Successful exploitation could compromise user sessions and potentially lead to unauthorized system access.

💻 Affected Systems

Products:
  • BD Alaris System with Guardrails Suite MX
Versions: Specific versions not detailed in provided references, but all unpatched versions are vulnerable
Operating Systems: Embedded medical device OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the System Manager User Import Function; medical devices in healthcare environments

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through session hijacking, allowing attackers to execute arbitrary commands, access sensitive medical data, and disrupt healthcare operations.

🟠

Likely Case

Unauthorized access to the system manager interface, potential data exfiltration, and manipulation of medical device settings.

🟢

If Mitigated

Limited impact with proper input validation and file upload restrictions in place, potentially preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the import function and ability to upload malicious files; CWE-79 indicates cross-site scripting vulnerability

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx

Restart Required: Yes

Instructions:

1. Review BD security bulletin for specific patch details. 2. Download and apply the security update from BD. 3. Restart the affected systems. 4. Verify the patch installation.

🔧 Temporary Workarounds

Disable User Import Function

all

Temporarily disable the vulnerable System Manager User Import Function until patching can be completed

Specific commands not provided; consult BD documentation for disabling procedures

Implement File Upload Restrictions

all

Configure strict file type validation and size limits for uploads to the import function

Configuration steps depend on specific BD system implementation

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected medical devices from general network access
  • Enable strict access controls and monitor all file upload activities to the System Manager interface

🔍 How to Verify

Check if Vulnerable:

Check if your BD Alaris System version matches vulnerable versions listed in BD security bulletin

Check Version:

Consult BD system documentation for version checking procedures

Verify Fix Applied:

Verify patch installation through system version check and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities to System Manager
  • Multiple failed import attempts
  • Suspicious user session creations

Network Indicators:

  • Unexpected connections to/from medical device management interfaces
  • Anomalous file transfer patterns

SIEM Query:

source="bd-alaris" AND (event="file_upload" OR event="user_import") AND file_type NOT IN ("csv", "txt")

🔗 References

📤 Share & Export