BD Pyxis (Update A)
A session management vulnerability in BD Pyxis ES and Pyxis Enterprise Server allows a user with expired Active Directory credentials to maintain access to medication dispensing cabinets if the devices are connected to the hospital domain. The vulnerability occurs because the systems do not properly validate credential expiration status when authenticating against Active Directory, allowing attackers with stale credentials to regain access with previously granted privileges. This could enable unauthorized access to patient data and medication inventory. The issue primarily affects organizations using non-recommended AD domain integration on Pyxis devices.
- Active Directory integration enabled on Pyxis device
- Pyxis device connected to hospital domain network
- Access to a previously valid but now-expired hospital network user account
- Knowledge of the expired account credentials
Patching may require device reboot — plan for process interruption
/api/v1/advisories/885b3701-5e04-4356-9343-e9e0ad4277c7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.