First published: Thu Jul 18 2024(Updated: )
A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Isite PACS | <12.2.8.410 |
Philips recommends upgrading to the latest Vue PACS version 12.2.8.400* released in August 2023. For managed services customers, new releases will be made available upon resource availability. Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact their local Philips Sales representative or submit a request in the Philips Informatics Support portal https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/www.informatics.support.philips.com/csm . Refer to the Philips advisory http://www.philips.com/productsecurity for more details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40159 has been rated with a medium severity, indicating potential risks to sensitive information.
CVE-2023-40159 affects users of Philips Vue PACS versions prior to 12.2.8.410 who are not explicitly authorized for certain sensitive information access.
To mitigate CVE-2023-40159, it is recommended to upgrade to Philips Vue PACS version 12.2.8.410 or later.
An attacker exploiting CVE-2023-40159 may gain unauthorized access to sensitive information within Philips Vue PACS on the same network.
Yes, Philips has released a patch for CVE-2023-40159 to address the vulnerabilities in the affected versions.