CVE-2024-10476

8.0 HIGH

📋 TL;DR

This vulnerability involves BD Diagnostic Solutions products using default credentials, allowing attackers to access, modify, or delete sensitive data including PHI and PII. It can also enable system shutdowns impacting availability. Only BD Synapsys Informatics Solution installed on NUC servers is affected, not virtual machines or BD Kiestra SCU hardware.

💻 Affected Systems

Products:
  • BD Diagnostic Solutions products
  • BD Synapsys Informatics Solution
Versions: All versions with default credentials
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Only BD Synapsys Informatics Solution installed on NUC servers is affected. Virtual machine installations and BD Kiestra SCU hardware are NOT affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data exfiltration of sensitive medical information, system shutdown affecting patient care, and potential ransomware deployment.

🟠

Likely Case

Unauthorized access to sensitive patient data and system configuration, potentially leading to data theft or system disruption.

🟢

If Mitigated

Limited impact due to network segmentation and credential rotation, with potential for detection of unauthorized access attempts.

🌐 Internet-Facing: HIGH if exposed to internet with default credentials unchanged
🏢 Internal Only: HIGH due to default credentials being easily guessable by internal threat actors

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Default credential vulnerabilities are trivial to exploit with basic knowledge of the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-cybersecurity-vulnerability-bulletin-diagnostic-solutions-products

Restart Required: No

Instructions:

1. Access the BD advisory link. 2. Follow BD's recommended remediation steps. 3. Change all default credentials to strong, unique passwords. 4. Implement credential rotation policies.

🔧 Temporary Workarounds

Credential Hardening

all

Change all default credentials immediately

Manual process - change passwords via system administration interface

Network Segmentation

all

Isolate affected systems from untrusted networks

Configure firewall rules to restrict access to trusted IPs only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules
  • Enable detailed logging and monitoring for authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if default credentials are still in use by attempting authentication with known defaults

Check Version:

Check system documentation or contact BD support for version information

Verify Fix Applied:

Verify that default credentials no longer work and strong passwords are required

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with default usernames
  • Successful logins from unexpected locations
  • Multiple failed login attempts

Network Indicators:

  • Unusual authentication traffic patterns
  • Access attempts from unauthorized IP ranges

SIEM Query:

source="*auth*" AND (user="admin" OR user="root" OR user="administrator") AND action="success"

🔗 References

📤 Share & Export