Vulnerabilities > Philips
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-01 | CVE-2021-33018 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Philips products The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information. | 5.0 |
2022-04-01 | CVE-2021-33020 | Operation on a Resource after Expiration or Release vulnerability in Philips products Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. | 7.5 |
2022-04-01 | CVE-2021-33022 | Cleartext Transmission of Sensitive Information vulnerability in Philips products Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. | 5.0 |
2022-04-01 | CVE-2021-33024 | Insufficiently Protected Credentials vulnerability in Philips products Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval. | 5.0 |
2022-04-01 | CVE-2022-0922 | Missing Authentication for Critical Function vulnerability in Philips E-Alert Firmware 2.1 The software does not perform any authentication for critical system functionality. | 5.7 |
2022-01-10 | CVE-2021-23173 | Unspecified vulnerability in Philips Engage The affected product is vulnerable to an improper access control, which may allow an authenticated user to gain unauthorized access to sensitive data. | 4.0 |
2021-12-27 | CVE-2021-32993 | Use of Hard-coded Credentials vulnerability in Philips products IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | 5.8 |
2021-12-27 | CVE-2021-33017 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Philips products The standard access path of the IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) requires authentication, but the product has an alternate path or channel that does not require authentication. | 5.8 |
2021-12-27 | CVE-2021-43548 | Improper Input Validation vulnerability in Philips Patient Information Center IX C.02/C.03 Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. | 3.3 |
2021-12-27 | CVE-2021-43550 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Philips Efficia CM Firmware and Patient Information Center IX The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0. | 3.3 |