Baxter PrismaFlex and PrisMax (Update B)
Baxter PrismaFlex and PrisMax infusion pumps contain multiple vulnerabilities (CWE-319: cleartext transmission, CWE-287: weak authentication, CWE-259: hardcoded credentials) that allow an attacker with network access to view and alter sensitive patient data and treatment parameters. The vulnerabilities stem from unencrypted communications and insufficient authentication controls on device APIs. PrisMax affects all versions below 3.x; PrismaFlex affects all versions currently in use. The primary risk is unauthorized access to infusion parameters or patient data by an attacker on the hospital network.
- Network access to the device (wired or wireless hospital network)
- No valid credentials required for exploitation
- Device must be reachable from the attacker's network position (e.g., same subnet or accessible VLAN)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1e8b93a5-50e6-4e5b-98f2-75ba329488feGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.