Lifecare Pcainfusion Firmware
Sign in to watchby Hospira
CVEs (6)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-3955 | 0.01 | — | 0.14 | Jul 6, 2015 | Stack-based buffer overflow in Hospira LifeCare PCA Infusion System 5.0 and earlier, and possibly other versions, allows remote attackers to execute arbitrary code via unspecified vectors. | ||
| CVE-2015-3459 | 0.01 | — | 0.18 | Apr 29, 2015 | The communication module on the Hospira LifeCare PCA Infusion System before 7.0 does not require authentication for root TELNET sessions, which allows remote attackers to modify the pump configuration via unspecified commands. | ||
| CVE-2015-3958 | 0.00 | — | 0.02 | Jul 6, 2015 | Hospira LifeCare PCA Infusion System 5.0 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (forced manual reboot) via a flood of TCP packets. | ||
| CVE-2015-3957 | 0.00 | — | 0.00 | Jul 6, 2015 | Hospira LifeCare PCA Infusion System before 7.0 stores private keys and certificates, which has unspecified impact and attack vectors. | ||
| CVE-2015-1011 | 0.00 | — | 0.01 | Jul 6, 2015 | Hospira LifeCare PCA Infusion System before 7.0 has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | ||
| CVE-2014-5406 | 0.00 | — | 0.01 | Jul 6, 2015 | The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might overlap CVE-2015-3459. |