{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"BodyGuard™ Pump","vendor":"Becton, Dickinson and Company (BD)","versions":[{"status":"affected","version":"BD BodyGuard™ "},{"status":"affected","version":"CME BodyGuard™ 323 (2nd Edition)"},{"status":"affected","version":"CME BodyGuard™ 323 Color Vision (2nd Edition)"},{"status":"affected","version":"CME BodyGuard™ 323 Color Vision (3rd Edition)"},{"status":"affected","version":"CME BodyGuard™ Twins (2nd Edition)"}]}],"datePublic":"2022-10-20T04:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The BD BodyGuard™ infusion pumps specified allow for access through the RS-232&nbsp;(serial) port interface. If exploited, threat actors with physical access, specialized equipment and&nbsp;knowledge may be able to configure or disable the pump. No electronic protected health information&nbsp;(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the&nbsp;pump."}],"value":"The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1299","description":"CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2325d071-eabf-4b7b-a4ea-0819b6629a18","shortName":"BD","dateUpdated":"2023-10-27T20:05:04.787Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"}],"source":{"discovery":"INTERNAL"},"title":"BD BodyGuard™ Pumps – RS-232 Interface Vulnerability","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"BD recommends the following mitigations and compensating controls to reduce risk associated with this<br>vulnerability:<br>• Ensure physical access controls are in place and only authorized end-users have access to<br>BD BodyGuard™ pumps.<br>• Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.<br>• Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering<br>infusions.<br>• Protect connected computer systems with BodyComm™ software with standard security measures.<br>"}],"value":"BD recommends the following mitigations and compensating controls to reduce risk associated with this\nvulnerability:\n• Ensure physical access controls are in place and only authorized end-users have access to\nBD BodyGuard™ pumps.\n• Ensure that only BD-approved equipment is connected to the RS-232 interface of the affected pumps.\n• Ensure that no equipment is connected to the RS-232 interface when the affected pumps are delivering\ninfusions.\n• Protect connected computer systems with BodyComm™ software with standard security measures.\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:32:59.566Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-bodyguard-pumps-rs-232-interface-vulnerability"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T15:46:47.466198Z","id":"CVE-2022-43557","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T15:47:10.734Z"}}]},"cveMetadata":{"assignerOrgId":"2325d071-eabf-4b7b-a4ea-0819b6629a18","cveId":"CVE-2022-43557","serial":1,"state":"PUBLISHED","dateUpdated":"2025-04-23T15:47:10.734Z","dateReserved":"2022-10-20T00:00:00.000Z","datePublished":"2022-12-05T00:00:00.000Z","assignerShortName":"BD"},"dataType":"CVE_RECORD","dataVersion":"5.1"}