First published: Wed Jan 20 2021(Updated: )
Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10). The software constructs all or part of an OS command using externally influenced input from an upstream component but does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when sent to a downstream component.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Coronary Tools | =1.0 | |
Philips Dynamic Coronary Roadmap | =1.0 | |
Philips Interventional Workspot | =1.3.2 | |
Philips Interventional Workspot | =1.4.0 | |
Philips Interventional Workspot | =1.4.1 | |
Philips Interventional Workspot | =1.4.3 | |
Philips Interventional Workspot | =1.4.5 | |
Philips Stentboost Live | =1.0 | |
Philips Viewforum | =6.3v1l10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2020-27298.
The affected software includes Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), and ViewForum (Release 6.3V1L10).
The severity rating of CVE-2020-27298 is medium, with a severity value of 6.5.
The Common Weakness Enumeration (CWE) ID associated with this vulnerability is CWE-78.
To fix the vulnerability CVE-2020-27298, it is recommended to apply the necessary patches and updates provided by Philips.