CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
12.7%
The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup.
Vendor | Product | Version | CPE |
---|---|---|---|
bd | facschorus | 5.0 | cpe:2.3:a:bd:facschorus:5.0:*:*:*:*:*:*:* |
bd | facschorus | 5.1 | cpe:2.3:a:bd:facschorus:5.1:*:*:*:*:*:*:* |
hp | hp_z2_tower_g9 | - | cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:* |
bd | facschorus | 3.0 | cpe:2.3:a:bd:facschorus:3.0:*:*:*:*:*:*:* |
bd | facschorus | 3.1 | cpe:2.3:a:bd:facschorus:3.1:*:*:*:*:*:*:* |
hp | hp_z2_tower_g5 | - | cpe:2.3:h:hp:hp_z2_tower_g5:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"64 bit"
],
"product": "FACSChorus",
"vendor": "Becton, Dickinson and Company (BD)",
"versions": [
{
"lessThanOrEqual": "5.1",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.1",
"status": "affected",
"version": "3.0",
"versionType": "custom"
}
]
}
]