(I)IoT Security News
ICS, News, Vulnerabilities

Philips Clinical Collaboration Platform

Philips Clinical Collaboration Platform

1. EXECUTIVE SUMMARY

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to trick a user into executing unauthorized actions or provide the attacker with identifying information that could be used for subsequent attacks.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Clinical Collaboration Platform, an HMI data management platform, are affected:

NOTE: The product is registered as Vue PACS but was re-branded to Philips Clinical Collaboration Platform when Philips acquired Carestream HCIS.

3.2 VULNERABILITY OVERVIEW

3.2.1    CROSS-SITE REQUEST FORGERY (CSRF) CWE-352

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.

CVE-2020-14506 has been assigned to this vulnerability. A CVSS v3 base score of 3.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).

3.2.2    IMPROPER NEUTRALIZATION OF SCRIPT IN ATTRIBUTES IN A WEB PAGE CWE-83

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a webpage that is served to other users.

CVE-2020-14525 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

3.2.3    PROTECTION MECHANISM FAILURE CWE-693

When an attacker claims to have a given identity, the software does not prove or insufficiently proves the claim is correct.

CVE-2020-16198 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

3.2.4    SELECTION OF LESS-SECURE ALGORITHM DURING NEGOTIATION (‘ALGORITHM DOWNGRADE’) CWE-757

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2020-16200 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

3.2.5    CONFIGURATION CWE-16

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

CVE-2020-16247 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).

3.3 BACKGROUND

3.4 RESEARCHER

Northridge Hospital Medical Center reported these vulnerabilities to Philips.

4. MITIGATIONS

Philips released the Clinical Collaboration Platform patch 12.2.1.5 in June 2020 for web portals to remediate CWE-352 and CWE-83.

Philips Clinical Collaboration Platform Version 12.2.5 was released in May 2020 to remediate CWE-16, CWE-352, CWE-83, and CWE-693. Philips requires manual intervention to remediate CWE-757.

Users with questions regarding their specific Philips Clinical Collaboration Platform installations and new release eligibility should contact Philips service support, or regional service support, or call 1-877-328-2808, option 4.

The Philips advisory and the latest security information for Philips products are available at the Philips product security website.

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target this these vulnerabilities. These vulnerabilities are not exploitable remotely.

Source:

https://us-cert.cisa.gov/ics/advisories/icsma-20-261-01

Related posts

Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L and FX Series CPU Modules (Update A)

(I) IoT
4 years ago

Schneider Electric U.motion Builder (Update A)

(I) IoT
6 years ago

Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs

(I) IoT
4 years ago
Exit mobile version