Philips Clinical Collaboration Platform
1. EXECUTIVE SUMMARY
- CVSS v3 6.8
- ATTENTION: Low skill level to exploit
- Vendor: Philips
- Equipment: Clinical Collaboration Platform
- Vulnerabilities: Cross-site Request Forgery, Improper Neutralization of Script in Attributes in a Web Page, Protection Mechanism Failure, Algorithm Downgrade, Configuration
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to trick a user into executing unauthorized actions or provide the attacker with identifying information that could be used for subsequent attacks.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Clinical Collaboration Platform, an HMI data management platform, are affected:
- Clinical Collaboration Platform Versions 12.2.1 and prior
NOTE: The product is registered as Vue PACS but was re-branded to Philips Clinical Collaboration Platform when Philips acquired Carestream HCIS.
3.2 VULNERABILITY OVERVIEW
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a webpage that is served to other users.
When an attacker claims to have a given identity, the software does not prove or insufficiently proves the claim is correct.
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
3.2.5 CONFIGURATION CWE-16
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
- CRITICAL INFRASTRUCTURE SECTORS: Healthcare and Public Health
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: Netherlands
Northridge Hospital Medical Center reported these vulnerabilities to Philips.
Philips released the Clinical Collaboration Platform patch 220.127.116.11 in June 2020 for web portals to remediate CWE-352 and CWE-83.
Philips Clinical Collaboration Platform Version 12.2.5 was released in May 2020 to remediate CWE-16, CWE-352, CWE-83, and CWE-693. Philips requires manual intervention to remediate CWE-757.
Users with questions regarding their specific Philips Clinical Collaboration Platform installations and new release eligibility should contact Philips service support, or regional service support, or call 1-877-328-2808, option 4.
The Philips advisory and the latest security information for Philips products are available at the Philips product security website.
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
- Implement physical security measures to limit or control access to critical systems.
- Restrict system access to authorized personnel only and follow a least privilege approach.
- Apply defense-in-depth strategies.
- Disable unnecessary accounts and services.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target this these vulnerabilities. These vulnerabilities are not exploitable remotely.