CVE-2023-29061: CWE-306 Missing Authentication for Critical Function in Becton, Dickinson and Company (BD) FACSChorus
There is no BIOS password on the FACSChorus workstation. A threat actor with physical access to the workstation can potentially exploit this vulnerability to access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication.
AI Analysis
Technical Summary
CVE-2023-29061 is a vulnerability identified in Becton, Dickinson and Company's (BD) FACSChorus workstations, specifically versions 3.0 and 5.0. The core issue is the absence of a BIOS password, which constitutes a missing authentication control for a critical function, categorized under CWE-306. This lack of BIOS-level authentication allows an attacker with physical access to the workstation to enter the BIOS setup without restriction. Consequently, the attacker can modify the BIOS configuration, including changing the drive boot order and disabling or altering BIOS pre-boot authentication mechanisms. Such changes can enable booting from unauthorized media, potentially allowing the attacker to bypass operating system-level security controls, install persistent malware, or extract sensitive data. The vulnerability has a CVSS v3.1 base score of 5.2, indicating a medium severity level. The vector metrics specify that exploitation requires physical access (AV:P), has low attack complexity (AC:L), does not require privileges (PR:N) or user interaction (UI:N), and impacts integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been released yet. The vulnerability primarily affects the BIOS security posture of the FACSChorus workstations, which are specialized laboratory instruments used for flow cytometry analysis in clinical and research environments. Given the critical role of these devices in medical diagnostics and research, unauthorized BIOS access could lead to significant operational disruptions and data integrity issues.
Potential Impact
For European organizations, particularly those in healthcare, biomedical research, and clinical diagnostics, this vulnerability poses a tangible risk. FACSChorus workstations are integral to flow cytometry workflows, and any compromise could disrupt diagnostic processes or research outcomes. An attacker modifying BIOS settings could introduce persistent malware or alter system behavior, potentially leading to inaccurate test results or data loss. This could undermine patient safety, research validity, and regulatory compliance with frameworks such as GDPR and medical device regulations. Additionally, the physical access requirement means that insider threats or unauthorized visitors in laboratories could exploit this vulnerability. The impact on availability is significant, as BIOS misconfiguration can render devices unbootable or unstable, causing downtime in critical laboratory operations. Although confidentiality impact is rated as none, the integrity and availability impacts are sufficient to cause operational and reputational damage. European healthcare institutions, which often have stringent security and privacy requirements, must consider this vulnerability seriously to maintain trust and compliance.
Mitigation Recommendations
To mitigate CVE-2023-29061 effectively, European organizations should implement the following specific measures: 1) Immediately enforce physical security controls around FACSChorus workstations, including restricted access to laboratory areas and surveillance to prevent unauthorized physical access. 2) Where possible, configure BIOS passwords manually on all affected devices to prevent unauthorized BIOS access; if the vendor does not provide a patch, organizations should engage with BD support for guidance or firmware updates. 3) Implement hardware-based security features such as Trusted Platform Module (TPM) and secure boot to limit unauthorized boot modifications. 4) Maintain strict inventory and asset management to quickly identify affected devices and monitor their physical security status. 5) Conduct regular audits of BIOS settings and system configurations to detect unauthorized changes promptly. 6) Train laboratory personnel on the risks of physical access vulnerabilities and enforce policies to prevent unauthorized device handling. 7) Develop incident response plans that include procedures for BIOS compromise scenarios to minimize downtime and data integrity risks. 8) Collaborate with BD and industry groups to stay informed about patches or firmware updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Switzerland
CVE-2023-29061: CWE-306 Missing Authentication for Critical Function in Becton, Dickinson and Company (BD) FACSChorus
Description
There is no BIOS password on the FACSChorus workstation. A threat actor with physical access to the workstation can potentially exploit this vulnerability to access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication.
AI-Powered Analysis
Technical Analysis
CVE-2023-29061 is a vulnerability identified in Becton, Dickinson and Company's (BD) FACSChorus workstations, specifically versions 3.0 and 5.0. The core issue is the absence of a BIOS password, which constitutes a missing authentication control for a critical function, categorized under CWE-306. This lack of BIOS-level authentication allows an attacker with physical access to the workstation to enter the BIOS setup without restriction. Consequently, the attacker can modify the BIOS configuration, including changing the drive boot order and disabling or altering BIOS pre-boot authentication mechanisms. Such changes can enable booting from unauthorized media, potentially allowing the attacker to bypass operating system-level security controls, install persistent malware, or extract sensitive data. The vulnerability has a CVSS v3.1 base score of 5.2, indicating a medium severity level. The vector metrics specify that exploitation requires physical access (AV:P), has low attack complexity (AC:L), does not require privileges (PR:N) or user interaction (UI:N), and impacts integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been released yet. The vulnerability primarily affects the BIOS security posture of the FACSChorus workstations, which are specialized laboratory instruments used for flow cytometry analysis in clinical and research environments. Given the critical role of these devices in medical diagnostics and research, unauthorized BIOS access could lead to significant operational disruptions and data integrity issues.
Potential Impact
For European organizations, particularly those in healthcare, biomedical research, and clinical diagnostics, this vulnerability poses a tangible risk. FACSChorus workstations are integral to flow cytometry workflows, and any compromise could disrupt diagnostic processes or research outcomes. An attacker modifying BIOS settings could introduce persistent malware or alter system behavior, potentially leading to inaccurate test results or data loss. This could undermine patient safety, research validity, and regulatory compliance with frameworks such as GDPR and medical device regulations. Additionally, the physical access requirement means that insider threats or unauthorized visitors in laboratories could exploit this vulnerability. The impact on availability is significant, as BIOS misconfiguration can render devices unbootable or unstable, causing downtime in critical laboratory operations. Although confidentiality impact is rated as none, the integrity and availability impacts are sufficient to cause operational and reputational damage. European healthcare institutions, which often have stringent security and privacy requirements, must consider this vulnerability seriously to maintain trust and compliance.
Mitigation Recommendations
To mitigate CVE-2023-29061 effectively, European organizations should implement the following specific measures: 1) Immediately enforce physical security controls around FACSChorus workstations, including restricted access to laboratory areas and surveillance to prevent unauthorized physical access. 2) Where possible, configure BIOS passwords manually on all affected devices to prevent unauthorized BIOS access; if the vendor does not provide a patch, organizations should engage with BD support for guidance or firmware updates. 3) Implement hardware-based security features such as Trusted Platform Module (TPM) and secure boot to limit unauthorized boot modifications. 4) Maintain strict inventory and asset management to quickly identify affected devices and monitor their physical security status. 5) Conduct regular audits of BIOS settings and system configurations to detect unauthorized changes promptly. 6) Train laboratory personnel on the risks of physical access vulnerabilities and enforce policies to prevent unauthorized device handling. 7) Develop incident response plans that include procedures for BIOS compromise scenarios to minimize downtime and data integrity risks. 8) Collaborate with BD and industry groups to stay informed about patches or firmware updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- BD
- Date Reserved
- 2023-03-30T21:10:17.526Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e66ec
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/3/2025, 9:55:06 PM
Last updated: 8/3/2025, 7:50:00 PM
Views: 14
Related Threats
CVE-2025-9000: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8993: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8992: Cross-Site Request Forgery in mtons mblog
MediumCVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.