First published: Thu Jul 18 2024(Updated: )
Philips Vue PACS does not require that users have strong passwords, which could make it easier for attackers to compromise user accounts.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips Isite PACS | <12.2.8.410 |
Philips recommends configuring the Vue PACS environment per 8G7607 – Vue PACS User Guide Rev G available on Incenter http://incenter.medical.philips.com/Default.aspx .For managed services customers, new releases will be made available upon resource availability. Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact their local Philips Sales representative or submit a request in the Philips Informatics Support portal https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/www.informatics.support.philips.com/csm . Refer to the Philips advisory http://www.philips.com/productsecurity for more details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40539 is considered a high-severity vulnerability due to the potential for account compromise.
To mitigate CVE-2023-40539, ensure that strong password policies are implemented and enforced.
CVE-2023-40539 affects Philips Vue PACS versions prior to 12.2.8.410.
CVE-2023-40539 is a vulnerability related to weak password requirements.
The risks associated with CVE-2023-40539 include unauthorized access and potential data breaches due to compromised accounts.