BD Kiestra and InoquIA Systems (Update A)
SQL injection vulnerabilities in BD Kiestra TLA WCA InoqulA+ specimen processor components (PerformA, ReadA Overview, Database Manager) allow authorized users with privileged accounts to execute arbitrary SQL commands. Successful exploitation can lead to loss, corruption, or unauthorized access to patient specimen data and protected health information. Affected versions: Database Manager 3.0.1.0, PerformA ≤3.0.0.0, ReadA Overview ≤1.1.0.2. BD has developed a mitigation to restrict SQL function execution by privileged users and is deploying it remotely or on-premise.
- Valid administrative/privileged account credentials for the BD Kiestra system
- Network access to the affected BD Kiestra component interface
- User interaction or ability to log in to the system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1c744462-845c-41c3-ae0d-f33c6de7d031Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.