BD Pyxis
BD Pyxis medication dispensing and supply management systems contain a WPA2 encryption vulnerability (KRACK - Key Reinstallation AttaCK) in Wi-Fi communication. Successful exploitation could allow an attacker to decrypt and manipulate encrypted data traffic, resulting in unauthorized access to medication transaction data or injection of false commands into the pharmacy workflow. The vulnerability affects all versions of BD Pyxis Anesthesia ES, Anesthesia System 3500/4000, MedStation ES/4000 T2, SupplyStation, Supply Roller, ParAssist, PARx (handheld and workstation), CIISafe Workstation, and StockStation System. BD has stated that third-party vendor patches are being deployed through routine channels for most devices, but some require direct coordination. No instances of active malicious exploitation have been reported.
- Wi-Fi network connectivity to the affected Pyxis device
- Physical proximity to the facility (Wi-Fi range, typically 100-300 feet depending on antenna strength)
- No special credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/093d6871-2269-4c38-b40d-061c323257c8