First published: Mon Apr 30 2018(Updated: )
Under specific 802.11 network conditions, a partial re-association of the Philips IntelliVue MX40 Version B.06.18 WLAN monitor to the central monitoring station is possible. In this state, the central monitoring station can indicate the MX40 is not connected or associated to the central monitor, and thus should be operating in local monitoring mode (local audio-on, screen-on), but the MX40 WLAN itself can instead still be operating in telemetry mode (local audio-off, screen-off). If a patient experiences an alarm event and clinical staff expects the MX40 to provide local alarming when it is not available from the local device, a delay of treatment can occur. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Intellivue Mx40 Firmware | <b.06.18 | |
Philips IntelliVue MX40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9657 has a medium severity rating due to its potential impact on system connectivity.
To mitigate CVE-2017-9657, ensure that you update the Philips IntelliVue MX40 firmware to the latest version beyond B.06.18.
CVE-2017-9657 affects Philips IntelliVue MX40 devices running firmware version B.06.18.
CVE-2017-9657 describes a potential issue with partial re-association in Philips IntelliVue MX40 WLAN monitors under specific network conditions.
Yes, CVE-2017-9657 could potentially be exploited remotely if the correct network conditions are met.