Vulnerabilites related to philips - vue_pacs
CVE-2021-39369 (GCVE-0-2021-39369)
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2025-04-14 16:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:06:42.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.youtube.com/watch?v=7zC84TNpIxw" }, { "tags": [ "x_transferred" ], "url": "https://www.usa.philips.com/healthcare" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-39369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:13:06.679804Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T16:13:10.668Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.youtube.com/watch?v=7zC84TNpIxw" }, { "url": "https://www.usa.philips.com/healthcare" }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-39369", "datePublished": "2022-12-26T00:00:00.000Z", "dateReserved": "2021-08-22T00:00:00.000Z", "dateUpdated": "2025-04-14T16:13:10.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27497 (GCVE-0-2021-27497)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-17 15:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CVE-693 Protection Mechanism Failure
Summary
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-27497", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T14:30:22.238517Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T15:51:10.222Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CVE-693 Protection Mechanism Failure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:19.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.1.5 in June of 2020 for MyVue to remediate this issue and recommends contacting support.\nPhilips released Version 12.2.8.0 in May of 2021 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Protection Mechanism Failure", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27497", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Protection Mechanism Failure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CVE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.1.5 in June of 2020 for MyVue to remediate this issue and recommends contacting support.\nPhilips released Version 12.2.8.0 in May of 2021 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27497", "datePublished": "2022-04-01T22:17:19.000Z", "dateReserved": "2021-02-19T00:00:00.000Z", "dateUpdated": "2025-04-17T15:51:10.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-40704 (GCVE-0-2023-40704)
Vulnerability from cvelistv5
Published
2024-07-18 16:33
Modified
2025-05-01 03:55
Severity ?
6.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
5.7 (Medium) - CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
5.7 (Medium) - CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-1392 - Use of Default Credentials
Summary
The product does not require unique and complex passwords to be created
during installation. Using Philips's default password could jeopardize
the PACS system if the password was hacked or leaked. An attacker could
gain access to the database impacting system availability and data
integrity.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "vue_pacs", "vendor": "philips", "versions": [ { "lessThan": "12.2.8.410", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-40704", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T03:55:13.843Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:51.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01" }, { "tags": [ "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThan": "12.2.8.410", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "TAS Health NZ and Camiel van Es reported these vulnerabilities to Philips." } ], "datePublic": "2024-07-18T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\nThe product does not require unique and complex passwords to be created \nduring installation. Using Philips\u0027s default password could jeopardize \nthe PACS system if the password was hacked or leaked. An attacker could \ngain access to the database impacting system availability and data \nintegrity.\n\n\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "The product does not require unique and complex passwords to be created \nduring installation. Using Philips\u0027s default password could jeopardize \nthe PACS system if the password was hacked or leaked. An attacker could \ngain access to the database impacting system availability and data \nintegrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.7, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1392", "description": "CWE-1392 Use of Default Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T20:17:10.791Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01" }, { "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePhilips recommends the following mitigations:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eFor CVE-2021-28165, Philips recommends configuring the Vue PACS \nenvironment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide \navailable on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://incenter.medical.philips.com/Default.aspx?tabid=867\"\u003eIncenter\u003c/a\u003e. Vue PACS version 12.2.8.410* released in October 2023 prevents this vulnerability.\u003c/li\u003e\n\u003cli\u003eFor CVE-2023-40704, Philips recommends no action needed due to low \nrisk of exploitability, but customers can request that Philips update \ndatabase password(s).\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor managed services users, new releases will be made available upon \nresource availability. Releases are subject to country specific \nregulations. Users with questions regarding their specific Philips Vue \nPACS installations and new release eligibility should contact their \nlocal Philips sales representative or submit a request in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.informatics.support.philips.com/csm\"\u003ePhilips Informatics Support portal\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eRefer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.philips.com/productsecurity\"\u003ePhilips advisory\u003c/a\u003e for more details.\n\n\u003cbr\u003e\u003c/p\u003e" } ], "value": "Philips recommends the following mitigations:\n\n\n\n * For CVE-2021-28165, Philips recommends configuring the Vue PACS \nenvironment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide \navailable on Incenter https://incenter.medical.philips.com/Default.aspx . Vue PACS version 12.2.8.410* released in October 2023 prevents this vulnerability.\n\n * For CVE-2023-40704, Philips recommends no action needed due to low \nrisk of exploitability, but customers can request that Philips update \ndatabase password(s).\n\n\n\n\nFor managed services users, new releases will be made available upon \nresource availability. Releases are subject to country specific \nregulations. Users with questions regarding their specific Philips Vue \nPACS installations and new release eligibility should contact their \nlocal Philips sales representative or submit a request in the Philips Informatics Support portal https://www.informatics.support.philips.com/csm .\n\n\nRefer to the Philips advisory https://www.philips.com/productsecurity for more details." } ], "source": { "advisory": "ICSMA-24-200-01", "discovery": "EXTERNAL" }, "title": "Philips Vue PACS Use of Default Credentials", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-40704", "datePublished": "2024-07-18T16:33:27.444Z", "dateReserved": "2023-08-21T22:12:52.587Z", "dateUpdated": "2025-05-01T03:55:13.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33020 (GCVE-0-2021-33020)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-16 16:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-324 - Use of a Key Past its Expiration Date
Summary
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-33020", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T15:58:07.250796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T16:33:04.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-324", "description": "CWE-324: Use of a Key Past its Expiration Date", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:17.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.1.5 in June of 2020 for Vue Motion to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Use of a Key Past its Expiration Date", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-33020", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Use of a Key Past its Expiration Date" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-324: Use of a Key Past its Expiration Date" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.1.5 in June of 2020 for Vue Motion to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-33020", "datePublished": "2022-04-01T22:17:17.000Z", "dateReserved": "2021-05-13T00:00:00.000Z", "dateUpdated": "2025-04-16T16:33:04.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27501 (GCVE-0-2021-27501)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-16 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-710 - Improper Adherence to Coding Standards
Summary
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:09.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-27501", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:30:35.884596Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T17:58:18.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-710", "description": "CWE-710: Improper Adherence to Coding Standards", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:16.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for MyVue to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Improper Adherence to Coding Standards", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27501", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Improper Adherence to Coding Standards" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-710: Improper Adherence to Coding Standards" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for MyVue to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27501", "datePublished": "2022-04-01T22:17:16.000Z", "dateReserved": "2021-02-19T00:00:00.000Z", "dateUpdated": "2025-04-16T17:58:18.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27493 (GCVE-0-2021-27493)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-17 15:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CVE-707 - Improper Neutralization
Summary
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:09.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-27493", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T14:30:25.220064Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-707", "description": "CWE-707 Improper Neutralization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T15:51:19.901Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CVE-707 - Improper Neutralization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:15.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for PACS that remediates this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27493", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CVE-707 - Improper Neutralization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for PACS that remediates this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27493", "datePublished": "2022-04-01T22:17:15.000Z", "dateReserved": "2021-02-19T00:00:00.000Z", "dateUpdated": "2025-04-17T15:51:19.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33022 (GCVE-0-2021-33022)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-319 - Cleartext Transmission of Sensitive Information
Summary
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-33022", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T15:58:02.615726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T16:32:46.240Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:20.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.8.0 in May of 2021 for Speech to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Cleartext Transmission of Sensitive Information", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-33022", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Cleartext Transmission of Sensitive Information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips released Version 12.2.8.0 in May of 2021 for Speech to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-33022", "datePublished": "2022-04-01T22:17:20.000Z", "dateReserved": "2021-05-13T00:00:00.000Z", "dateUpdated": "2025-04-16T16:32:46.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33018 (GCVE-0-2021-33018)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-16 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-33018", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:30:33.250501Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T17:58:08.329Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:21.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Use of a Broken or Risky Cryptographic Algorithm", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-33018", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Use of a Broken or Risky Cryptographic Algorithm" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for Speech to remediate this issue and recommends contacting support.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-33018", "datePublished": "2022-04-01T22:17:21.000Z", "dateReserved": "2021-05-13T00:00:00.000Z", "dateUpdated": "2025-04-16T17:58:08.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33024 (GCVE-0-2021-33024)
Vulnerability from cvelistv5
Published
2022-04-01 22:17
Modified
2025-04-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Summary
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Philips | Vue PACS |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.philips.com/productsecurity" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-33024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T15:55:08.668287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T16:32:54.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Vue PACS", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue MyVue", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Speech", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.x.x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Vue Motion", "vendor": "Philips", "versions": [ { "lessThanOrEqual": "12.2.1.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Philips reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T22:17:18.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.philips.com/productsecurity" } ], "solutions": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" }, "title": "Philips Vue PACS Insufficiently Protected Credentials", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-33024", "STATE": "PUBLIC", "TITLE": "Philips Vue PACS Insufficiently Protected Credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Vue PACS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue MyVue", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Speech", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.x.x" } ] } }, { "product_name": "Vue Motion", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.2.1.5" } ] } } ] }, "vendor_name": "Philips" } ] } }, "credit": [ { "lang": "eng", "value": "Philips reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522: Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "name": "http://www.philips.com/productsecurity", "refsource": "CONFIRM", "url": "http://www.philips.com/productsecurity" } ] }, "solution": [ { "lang": "en", "value": "Philips has released the following plans to address these vulnerabilities:\nPhilips recommends configuring the Vue PACS environment per D000763414 \u2013 Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter.\nPhilips will release Version 15 in Q1 / 2022 for PACS to remediate this issue and recommends contacting support.\nReleases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com)\n\nThe Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-33024", "datePublished": "2022-04-01T22:17:18.000Z", "dateReserved": "2021-05-13T00:00:00.000Z", "dateUpdated": "2025-04-16T16:32:54.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-07-18 17:15
Modified
2025-04-09 21:16
Severity ?
6.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The product does not require unique and complex passwords to be created
during installation. Using Philips's default password could jeopardize
the PACS system if the password was hacked or leaked. An attacker could
gain access to the database impacting system availability and data
integrity.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Product | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3D16037-0684-4486-80A7-8EE98DD4E851", "versionEndExcluding": "12.2.8.410", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The product does not require unique and complex passwords to be created \nduring installation. Using Philips\u0027s default password could jeopardize \nthe PACS system if the password was hacked or leaked. An attacker could \ngain access to the database impacting system availability and data \nintegrity." }, { "lang": "es", "value": "Philips Vue PACS utiliza credenciales predeterminadas para funciones potencialmente cr\u00edticas." } ], "id": "CVE-2023-40704", "lastModified": "2025-04-09T21:16:24.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2024-07-18T17:15:03.897", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1392" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2024-11-21 06:08
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, transmite o almacena credenciales de autenticaci\u00f3n, pero usa un m\u00e9todo no seguro susceptible de ser interceptado y/o recuperado sin autorizaci\u00f3n" } ], "id": "CVE-2021-33024", "lastModified": "2024-11-21T06:08:08.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:10.307", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2024-11-21 05:58
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, no siguen determinadas reglas de codificaci\u00f3n para el desarrollo, lo que puede conllevar a debilidades resultantes o aumentar la gravedad de las vulnerabilidades asociadas" } ], "id": "CVE-2021-27501", "lastModified": "2024-11-21T05:58:07.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:09.317", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-710" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2024-11-21 06:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, transmite datos confidenciales o cr\u00edticos para la seguridad en texto sin cifrar en un canal de comunicaci\u00f3n que puede ser rastreado por actores no autorizados" } ], "id": "CVE-2021-33022", "lastModified": "2024-11-21T06:08:08.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:10.253", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-26 06:15
Modified
2025-04-14 17:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.usa.philips.com/healthcare | Vendor Advisory | |
cve@mitre.org | https://www.youtube.com/watch?v=7zC84TNpIxw | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.usa.philips.com/healthcare | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.youtube.com/watch?v=7zC84TNpIxw | Product |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:-:*:*:*:*:*:*:*", "matchCriteriaId": "005F8DBC-89E9-41B2-87FF-5A915722526A", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F89D027-058F-4F9C-8FA0-5DA010DF5E56", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDBF4274-A4B5-44C1-B164-2F0AA8CE4F8D", "versionEndIncluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EFFDEB6-EF45-4AA3-BF17-FCE171ACD20F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root." }, { "lang": "es", "value": "En Philips (anteriormente Carestream) Vue MyVue PACS hasta 12.2.xx, la funci\u00f3n VideoStream permite que usuarios autenticados realicen Path Traversal para acceder a archivos almacenados fuera de la ra\u00edz web." } ], "id": "CVE-2021-39369", "lastModified": "2025-04-14T17:15:24.687", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-12-26T06:15:10.617", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.usa.philips.com/healthcare" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.youtube.com/watch?v=7zC84TNpIxw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.usa.philips.com/healthcare" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.youtube.com/watch?v=7zC84TNpIxw" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2025-04-17 16:15
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, no asegura o asegura incorrectamente que los mensajes o datos estructurados est\u00e9n bien formados y que sean cumplidas determinadas propiedades de seguridad antes de ser le\u00eddos desde un componente ascendente o enviados a un componente descendente" } ], "id": "CVE-2021-27493", "lastModified": "2025-04-17T16:15:22.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:09.207", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-707" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2025-04-17 16:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, no usa o usa de forma incorrecta un mecanismo de protecci\u00f3n que proporciona una defensa suficiente contra los ataques dirigidos contra el producto" } ], "id": "CVE-2021-27497", "lastModified": "2025-04-17T16:15:23.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.2, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:09.267", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2024-11-21 06:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information." }, { "lang": "es", "value": "El uso de un algoritmo criptogr\u00e1fico roto o arriesgado en Philips Vue PACS versiones 12.2.x.x y anteriores, es un riesgo innecesario que puede resultar en una exposici\u00f3n de informaci\u00f3n confidencial" } ], "id": "CVE-2021-33018", "lastModified": "2024-11-21T06:08:08.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:10.137", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-01 23:15
Modified
2024-11-21 06:08
Severity ?
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.philips.com/productsecurity | Vendor Advisory | |
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.philips.com/productsecurity | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:myvue:*:*:*:*:*:*:*:*", "matchCriteriaId": "318C7D67-5A69-46FE-91D6-46D970BD04CC", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:speech:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E491B68-B518-443D-95A5-56C14759C047", "versionEndExcluding": "12.2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_motion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDCF9C-D950-42E1-8827-76E12F3F280F", "versionEndExcluding": "12.2.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DD47316-BA3D-4819-90F9-75B41292A154", "versionEndExcluding": "12.2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key." }, { "lang": "es", "value": "Philips Vue PACS versiones 12.2.x.x y anteriores, de usan una clave criptogr\u00e1fica o una contrase\u00f1a que ya ha caducado, lo que disminuye significativamente su seguridad al aumentar la ventana de tiempo para los ataques de cracking contra esa clave" } ], "id": "CVE-2021-33020", "lastModified": "2024-11-21T06:08:08.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:10.193", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.philips.com/productsecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-324" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-672" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }