Filtered by vendor Philips
Subscribe
Total
99 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-33022 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. | |||||
CVE-2022-0922 | 1 Philips | 2 E-alert, E-alert Firmware | 2024-02-04 | 5.7 MEDIUM | 6.5 MEDIUM |
The software does not perform any authentication for critical system functionality. | |||||
CVE-2021-27501 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities. | |||||
CVE-2021-33020 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. | |||||
CVE-2021-27497 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. | |||||
CVE-2021-27493 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 6.4 MEDIUM | 6.5 MEDIUM |
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. | |||||
CVE-2021-33024 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval. | |||||
CVE-2021-32966 | 1 Philips | 1 Interoperability Solution Xds | 2024-02-04 | 4.3 MEDIUM | 7.5 HIGH |
Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials. | |||||
CVE-2021-33018 | 1 Philips | 4 Myvue, Speech, Vue Motion and 1 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information. | |||||
CVE-2021-26248 | 1 Philips | 4 Mri 1.5t, Mri 1.5t Firmware, Mri 3t and 1 more | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource. | |||||
CVE-2021-43552 | 1 Philips | 1 Patient Information Center Ix | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03. | |||||
CVE-2021-33017 | 1 Philips | 4 Intellibridge Ec40, Intellibridge Ec40 Firmware, Intellibridge Ec80 and 1 more | 2024-02-04 | 5.8 MEDIUM | 8.8 HIGH |
The standard access path of the IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) requires authentication, but the product has an alternate path or channel that does not require authentication. | |||||
CVE-2021-26262 | 1 Philips | 4 Mri 1.5t, Mri 1.5t Firmware, Mri 3t and 1 more | 2024-02-04 | 5.0 MEDIUM | 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.x.x does not restrict or incorrectly restricts access to a resource from an unauthorized actor. | |||||
CVE-2021-32993 | 1 Philips | 4 Intellibridge Ec40, Intellibridge Ec40 Firmware, Intellibridge Ec80 and 1 more | 2024-02-04 | 5.8 MEDIUM | 8.8 HIGH |
IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | |||||
CVE-2021-43550 | 1 Philips | 3 Efficia Cm, Efficia Cm Firmware, Patient Information Center Ix | 2024-02-04 | 3.3 LOW | 6.5 MEDIUM |
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0. | |||||
CVE-2021-43548 | 1 Philips | 1 Patient Information Center Ix | 2024-02-04 | 3.3 LOW | 6.5 MEDIUM |
Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. | |||||
CVE-2021-23173 | 1 Philips | 1 Engage | 2024-02-04 | 4.0 MEDIUM | 4.3 MEDIUM |
The affected product is vulnerable to an improper access control, which may allow an authenticated user to gain unauthorized access to sensitive data. | |||||
CVE-2021-42744 | 1 Philips | 4 Mri 1.5t, Mri 1.5t Firmware, Mri 3t and 1 more | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access. | |||||
CVE-2021-39375 | 1 Philips | 1 Tasy Electronic Medical Record | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the WAdvancedFilter/getDimensionItemsByCode FilterValue parameter. | |||||
CVE-2021-39376 | 1 Philips | 1 Tasy Electronic Medical Record | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter. |