Skip to main content

CVE-2022-40263: CWE-798 Use of Hard-coded Credentials in Becton Dickson (BD) BD Totalys MultiProcessor

Medium
VulnerabilityCVE-2022-40263cvecve-2022-40263cwe-798
Published: Fri Nov 04 2022 (11/04/2022, 18:58:53 UTC)
Source: CVE
Vendor/Project: Becton Dickson (BD)
Product: BD Totalys MultiProcessor

Description

BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.

AI-Powered Analysis

AILast updated: 06/25/2025, 12:47:51 UTC

Technical Analysis

CVE-2022-40263 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within the Becton Dickinson (BD) BD Totalys MultiProcessor software, specifically version 1.70 and earlier. Hard-coded credentials are embedded usernames or passwords within the software code that cannot be changed by the user, creating a significant security risk. This vulnerability allows an attacker with local access and low privileges (as indicated by the CVSS vector AV:L/PR:L) to leverage these static credentials to gain unauthorized access to the system. Exploiting this flaw could enable threat actors to access, modify, or delete sensitive data, including electronic protected health information (ePHI), protected health information (PHI), and personally identifiable information (PII), which are critical in healthcare environments. The vulnerability does not require user interaction (UI:N) and affects confidentiality to a high degree (C:H), with limited impact on integrity (I:L) and availability (A:L). The attack complexity is low (AC:L), but the attack vector is local, meaning the attacker must have some level of access to the system. Additionally, customers running BD Totalys MultiProcessor version 1.70 on Microsoft Windows 10 benefit from additional OS hardening configurations that increase the difficulty of exploitation. No known exploits are reported in the wild, and no patches are currently linked, indicating that mitigation may rely on configuration changes or vendor updates. The vulnerability's medium severity score (6.6) reflects the balance between the high confidentiality impact and the local access requirement for exploitation.

Potential Impact

For European organizations, particularly those in the healthcare sector using BD Totalys MultiProcessor, this vulnerability poses a significant risk to the confidentiality of sensitive patient data, including ePHI and PII. Unauthorized access could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. The ability to modify or delete data also threatens data integrity and availability, potentially disrupting clinical workflows and patient care. Given the local access requirement, insider threats or attackers who gain initial footholds within networks are the most likely vectors. The presence of hard-coded credentials undermines standard security controls and complicates incident response. Organizations with Windows 10 deployments may have a marginally reduced risk due to OS hardening, but the vulnerability remains exploitable. The lack of known exploits suggests limited current active targeting; however, the sensitive nature of the data involved and the criticality of healthcare operations in Europe elevate the potential impact if exploited.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting local access to systems running BD Totalys MultiProcessor, enforcing strict access controls and monitoring for unauthorized access attempts. 2. Implement network segmentation to isolate vulnerable systems from broader enterprise networks, reducing the attack surface. 3. Conduct thorough audits to identify all instances of BD Totalys MultiProcessor version 1.70 or earlier and prioritize their upgrade or replacement. 4. Engage with Becton Dickinson to obtain official patches or guidance; if unavailable, consider disabling or limiting the use of affected software components where feasible. 5. Enhance endpoint security measures, including application whitelisting and behavior monitoring, to detect anomalous activities indicative of exploitation attempts. 6. Train staff on insider threat awareness and enforce strict credential management policies to prevent misuse of hard-coded credentials. 7. Regularly back up critical data and verify the integrity of backups to ensure recovery capability in case of data modification or deletion. 8. Leverage Windows 10 security features such as Credential Guard and exploit protection where applicable to increase resistance to exploitation. 9. Implement comprehensive logging and alerting on access to BD Totalys MultiProcessor systems to enable rapid detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
BD
Date Reserved
2022-09-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed6ca

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 12:47:51 PM

Last updated: 8/9/2025, 12:52:30 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats