CVE-2018-8857
https://notcve.org/view.php?id=CVE-2018-8857
Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. An attacker could compromise these credentials and gain access to the system. El software de Philips Brilliance CT (Brilliance 64 en versiones 2.6.2 y anteriores, Brilliance iCT en versiones 4.1.6 y anteriores, Brilliance iCT SP en versiones 3.2.4 y anteriores y Brilliance CT Big Bore 2.3.5 y anteriores) contiene credenciales fijas, como una contraseña o clave criptográfica, que emplea para su propia autenticación entrante, comunicaciones salientes a componentes externos o el cifrado de datos internos. Un atacante podría comprometer estas credenciales y obtener acceso al sistema. • http://www.securityfocus.com/bid/104088 https://ics-cert.us-cert.gov/advisories/ICSMA-18-123-01 https://www.usa.philips.com/healthcare/about/customer-support/product-security • CWE-798: Use of Hard-coded Credentials •
CVE-2018-8861
https://notcve.org/view.php?id=CVE-2018-8861
Vulnerabilities within the Philips Brilliance CT kiosk environment (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) could enable a limited-access kiosk user or an unauthorized attacker to break-out from the containment of the kiosk environment, attain elevated privileges from the underlying Windows OS, and access unauthorized resources from the operating system. Vulnerabilidades en el entorno de quiosco de Philips Brilliance CT (Brilliance 64 en versiones 2.6.2 y anteriores, Brilliance iCT en versiones 4.1.6 y anteriores, Brillance iCT SP en versiones 3.2.4 y anteriores y Brilliance CT Big Bore 2.3.5 y anteriores) podrían permitir que un usuario del quiosco con acceso limitado o un atacante no autorizado salgan del confinamiento del entorno del quiosco, logren privilegios elevados del sistema operativo de Windows y accedan a recursos no autorizados del sistema operativo. • http://www.securityfocus.com/bid/104088 https://ics-cert.us-cert.gov/advisories/ICSMA-18-123-01 https://www.usa.philips.com/healthcare/about/customer-support/product-security • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2018-8853
https://notcve.org/view.php?id=CVE-2018-8853
Philips Brilliance CT devices operate user functions from within a contained kiosk in a Microsoft Windows operating system. Windows boots by default with elevated Windows privileges, enabling a kiosk application, user, or an attacker to potentially attain unauthorized elevated privileges in Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior. Also, attackers may gain access to unauthorized resources from the underlying Windows operating system. Los dispositivos Philips Brilliance CT operan funciones del usuario desde dentro de un quiosco contenido en un sistema operativo Microsoft Windows. Windows se carga por defecto con privilegios de Windows elevados, lo que permite que una aplicación quiosco, usuario o un atacante puedan conseguir privilegios elevados en Brilliance 64 en versiones 2.6.2 y anteriores, Brilliance iCT en versiones 4.1.6 y anteriores, Brillance iCT SP en versiones 3.2.4 y anteriores y Brilliance CT Big Bore en versiones 2.3.5 y anteriores. • http://www.securityfocus.com/bid/104088 https://ics-cert.us-cert.gov/advisories/ICSMA-18-123-01 https://www.usa.philips.com/healthcare/about/customer-support/product-security • CWE-250: Execution with Unnecessary Privileges CWE-269: Improper Privilege Management •
CVE-2017-9657
https://notcve.org/view.php?id=CVE-2017-9657
Under specific 802.11 network conditions, a partial re-association of the Philips IntelliVue MX40 Version B.06.18 WLAN monitor to the central monitoring station is possible. In this state, the central monitoring station can indicate the MX40 is not connected or associated to the central monitor, and thus should be operating in local monitoring mode (local audio-on, screen-on), but the MX40 WLAN itself can instead still be operating in telemetry mode (local audio-off, screen-off). If a patient experiences an alarm event and clinical staff expects the MX40 to provide local alarming when it is not available from the local device, a delay of treatment can occur. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. • http://www.securityfocus.com/bid/100813 https://ics-cert.us-cert.gov/advisories/ICSMA-17-255-01 https://www.usa.philips.com/healthcare/about/customer-support/product-security • CWE-460: Improper Cleanup on Thrown Exception CWE-755: Improper Handling of Exceptional Conditions •
CVE-2017-9658
https://notcve.org/view.php?id=CVE-2017-9658
Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point. • http://www.securityfocus.com/bid/100813 https://ics-cert.us-cert.gov/advisories/ICSMA-17-255-01 https://www.usa.philips.com/healthcare/about/customer-support/product-security • CWE-755: Improper Handling of Exceptional Conditions •