The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software