Vulnerabilities > Philips
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-05-04 | CVE-2018-8861 | Unspecified vulnerability in Philips products Vulnerabilities within the Philips Brilliance CT kiosk environment (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) could enable a limited-access kiosk user or an unauthorized attacker to break-out from the containment of the kiosk environment, attain elevated privileges from the underlying Windows OS, and access unauthorized resources from the operating system. | 8.7 |
2018-05-04 | CVE-2018-8857 | Use of Hard-coded Credentials vulnerability in Philips products Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | 7.8 |
2018-05-04 | CVE-2018-8853 | Improper Privilege Management vulnerability in Philips products Philips Brilliance CT devices operate user functions from within a contained kiosk in a Microsoft Windows operating system. | 8.8 |
2018-04-30 | CVE-2017-9658 | Improper Handling of Exceptional Conditions vulnerability in Philips Intellivue Mx40 Firmware Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. | 6.5 |
2018-04-30 | CVE-2017-9657 | Improper Handling of Exceptional Conditions vulnerability in Philips Intellivue Mx40 Firmware Under specific 802.11 network conditions, a partial re-association of the Philips IntelliVue MX40 Version B.06.18 WLAN monitor to the central monitoring station is possible. | 6.5 |
2018-04-24 | CVE-2017-9656 | Use of Hard-coded Credentials vulnerability in Philips Dosewise 1.1.7.333/2.1.1.3069 The backend database of the Philips DoseWise Portal application versions 1.1.7.333 and 2.1.1.3069 uses hard-coded credentials for a database account with privileges that can affect confidentiality, integrity, and availability of the database. | 9.1 |
2018-04-24 | CVE-2017-9654 | Insufficiently Protected Credentials vulnerability in Philips Dosewise 1.1.7.333/2.1.1.3069 The Philips DoseWise Portal web-based application versions 1.1.7.333 and 2.1.1.3069 stores login credentials in clear text within backend system files. | 8.8 |
2018-03-28 | CVE-2018-7498 | Missing Encryption of Sensitive Data vulnerability in Philips Alice 6 Firmware R8.0.2 In Philips Alice 6 System version R8.0.2 or prior, the lack of proper data encryption passes up the guarantees of confidentiality, integrity, and accountability that properly implemented encryption conveys. | 9.8 |
2018-03-28 | CVE-2018-5451 | Improper Authentication vulnerability in Philips Alice 6 Firmware R8.0.2 In Philips Alice 6 System version R8.0.2 or prior, when an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. | 9.8 |
2018-03-26 | CVE-2018-5474 | Improper Input Validation vulnerability in Philips Intellispace Portal 8.0/9.0 Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash. | 9.8 |