SB2023112921 - Multiple vulnerabilities in BD FACSChorus
Published: November 29, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Missing Protection Mechanism for Alternate Hardware Interface (CVE-ID: CVE-2023-29060)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the respective workstation operating system does not restrict what devices can interact with its USB ports. An authenticated attacker with physical access can gain access to system information and potentially exfiltrate data.
2) Missing Authentication for Critical Function (CVE-ID: CVE-2023-29061)
The vulnerability allows a local attacker to bypass authentication process.
The vulnerability exists due to missing BIOS password. An attacker with physical access can access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication.
3) Improper Authentication (CVE-ID: CVE-2023-29062)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error when processing authentication requests. A remote attacker on the local network can perform a brute-force attack, crack the hashes and gain access to sensitive information.
4) Missing Protection Mechanism for Alternate Hardware Interface (CVE-ID: CVE-2023-29063)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the workstation does not prevent physical access to its PCI express (PCIe) slots. An attacker with physical access can insert a PCI card designed for memory capture and isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
5) Use of hard-coded credentials (CVE-ID: CVE-2023-29064)
The vulnerability allows a local attacker to gain access to sensitive information.
The vulnerability exists due to the software contains sensitive information stored in plaintext. An authenticated attacker with physical access can gain hardcoded secrets used by the application
6) Insecure Inherited Permissions (CVE-ID: CVE-2023-29065)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the affected software database can be accessed directly with the privileges of the currently logged-in user. An authenticated attacker with physical access can gain credentials, which could be used to alter or destroy data stored in the database.
7) Incorrect Privilege Assignment (CVE-ID: CVE-2023-29066)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the affected software does not properly assign data access privileges for operating system user accounts. An authenticated attacker with physical access can modify information stored in the local application data folders.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.