CVE-2023-40539
Philips Vue PACS Weak Password Requirements
Severity Score
4.8
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
Philips Vue PACS does not require that users have strong passwords, which could make it easier for attackers to compromise user accounts.
Philips Vue PACS no requiere que los usuarios tengan contraseñas seguras, lo que podría facilitar que los atacantes comprometan las cuentas de los usuarios.
*Credits:
TAS Health NZ and Camiel van Es reported these vulnerabilities to Philips.
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-08-21 CVE Reserved
- 2024-07-18 CVE Published
- 2024-08-02 CVE Updated
- 2024-09-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-521: Weak Password Requirements
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.philips.com/productsecurity | ||
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Philips Search vendor "Philips" | Vue PACS Search vendor "Philips" for product "Vue PACS" | < 12.2.8.410 Search vendor "Philips" for product "Vue PACS" and version " < 12.2.8.410" | en |
Affected
|