First published: Fri May 04 2018(Updated: )
Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. An attacker could compromise these credentials and gain access to the system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Brilliance Firmware 64 | <=2.6.2 | |
Philips Brilliance 64 | ||
Philips Brilliance Ict Sp Firmware | <=3.2.4 | |
Philips Brilliance Ict Sp | ||
Philips Brilliance Ict Firmware | <=4.1.6 | |
Philips Brilliance Ict | ||
Philips Brilliance Ct Big Bore Firmware | <=2.3.5 | |
Philips Brilliance Ct Big Bore |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8857 is considered a high-severity vulnerability due to the presence of fixed credentials in Philips Brilliance CT software.
To fix CVE-2018-8857, you should update the Philips Brilliance CT software to the latest version that mitigates the use of fixed credentials.
CVE-2018-8857 affects Philips Brilliance CT software versions 2.6.2 and earlier, as well as several versions of Brilliance iCT and Brilliance CT Big Bore.
The consequences of CVE-2018-8857 include potential unauthorized access to sensitive information due to hard-coded credentials.
Yes, there are public advisories available that detail the specifics of CVE-2018-8857 and recommended actions.