BD Diagnostic Solutions Products (Update A)
BD Diagnostic Solutions products contain hard-coded default service credentials that can be used by anyone with direct access to the affected device or the local clinic network. Exploitation allows an attacker to access, modify, or delete sensitive data and patient information, or trigger system shutdown. Affected products are: BD BACTEC Blood Culture System, BD COR System, BD EpiCenter Microbiology Data Management System, BD MAX System, BD Phoenix M50 Automated Microbiology System, and BD Synapsys Informatics Solution (on NUC servers only). This vulnerability is not remotely exploitable and requires the attacker to either be physically present in the clinic or have compromised the local network. BD has developed patches and will proactively contact users to schedule remediation, with deployment expected in the first half of 2025.
- Direct access to the local network (logical or physical presence in the clinical facility)
- Knowledge of the default service credentials used by BD technical support teams
Patching may require device reboot — plan for process interruption
/api/v1/advisories/21b59889-c812-44ea-94f2-5e88025a910fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.