First published: Fri Sep 11 2020(Updated: )
In Patient Information Center iX (PICiX) Versions C.02, C.03, the software parses a formatted message or structure but does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data, causing the application on the surveillance station to restart.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Patient Information Center Ix | =c.02 | |
Philips Patient Information Center Ix | =c.03 |
Philips released the following versions to remediate reported vulnerabilities: * Patient Information Center iX (PICiX) Version C.03 * Certificate revocation within the system was implemented for PIC iX.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-16224.
The affected software for this vulnerability is Philips Patient Information Center iX Versions B.02, C.02, C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX850, and MP2-MP90 Versions N and prior, IntelliVue X3 and X2 Versions N and prior.
The severity of CVE-2020-16224 is medium, with a severity score of 6.5.
This vulnerability allows an attacker to execute arbitrary code or cause a denial of service on the affected software.
Yes, there is a patch available to fix CVE-2020-16224. It is recommended to apply the patch as soon as possible.