BD Alaris 8015 PC Unit and BD Alaris Systems Manager
BD Alaris PC Unit Model 8015 and Systems Manager contain an authentication interception vulnerability in wireless communications. An attacker on the network can redirect authentication requests to the Systems Manager using a custom authentication handler, causing the Alaris PC Unit to drop its wireless connectivity. While the device continues to operate on locally stored infusion parameters, network-dependent features fail: EMR Interoperability (pre-population of infusion parameters) and remote delivery of System Guardrails updates (DERS) become unavailable. The vulnerability requires network access and ability to intercept wireless traffic but does not require valid credentials.
- Network access to the wireless segment where the Alaris PC Unit operates
- Ability to intercept and redirect network traffic (man-in-the-middle position)
- Custom code to parse and respond to authentication requests
Patching may require device reboot — plan for process interruption
/api/v1/advisories/930e1f28-9aff-4da3-8218-8b9c296a9f65Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.