{"id":8632,"date":"2021-07-20T05:35:10","date_gmt":"2021-07-20T12:35:10","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8632"},"modified":"2023-03-03T14:19:08","modified_gmt":"2023-03-03T21:19:08","slug":"radiographers-patch-these-16-philips-vue-pacs-vulnerabilities","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/radiographers-patch-these-16-philips-vue-pacs-vulnerabilities\/","title":{"rendered":"Radiographers: Patch These 16 Philips Vue PACS Vulnerabilities"},"content":{"rendered":"
On 6 July 2021, Philips – a multinational healthcare association, released security patches for 16\u00a0serious vulnerabilities<\/strong> in their PACS Clinical Collaboration Platform. Picture Archiving and Communications System (PACS) software allows healthcare clinics and hospitals to digitally view MRIs, CT scans, and ultrasound images of the patients from several locations.<\/p>\n Storing medical images that belong to patients is an extremely sensitive process. However, the most likely reason for threat actors to break-in is that the PACS is employed as a gateway to the rest of the medical records, giving them the opportunity to shut down services and use it as a possible ransomware threat to demand money from the healthcare provider.<\/p>\n We analyzed 16\u00a0vulnerabilities in the Philips Vue PACS software and highlighted the ones that need to be prioritized for immediate patching.<\/p>\n We have three vulnerabilities that are known exploits. Here is what we found –<\/p>\n Two CVEs are associated with Buffer Overflow and one is Remote Code Execution.<\/p>\n<\/li>\n CVE-2018-10115 is linked to Stop ransomware.<\/strong><\/p>\n<\/li>\n All of the weaponized vulnerabilities are older ones with a CVSS v3 score ranging from 7.8<\/strong> to 9.8<\/strong>.<\/p>\n<\/li>\n All three CVEs have been red-flagged by CISA.<\/p>\n<\/li>\n CVE-2018-12326 and CVE-2018-11218 have a CWE ID of CWE-119<\/strong> (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787<\/strong> (Out-of-bounds Write) that falls under the 2020 Top 5 most dangerous software weaknesses.<\/a><\/p>\n<\/li>\n Popular scanners such as Nessus and Qualys were able to detect these weaponized vulnerabilities.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n Nine Old vulnerabilities have been patched, ranging from the year 2012 to 2020.<\/p>\n Two CVEs are linked to Stop<\/strong> and Maze<\/strong> ransomware.<\/p>\n<\/li>\n Seven CVEs are classified as RCE bugs, two are Buffer Overflow, and one is Cross-Site Request Forgery.<\/p>\n<\/li>\n Interestingly, CVE-2015-9251 is associated with Maze ransomware<\/strong>, APT 1,<\/strong> and\u00a0Malware threats\u00a0 (OceanSalt<\/strong>, Auriga<\/strong>, Bangat<\/strong>, BISCUIT<\/strong>, MAPIGET<\/strong>, TARSIP<\/strong>, SEASALT<\/strong>,\u00a0 KURTON<\/strong>, and\u00a0 HELAUTO).<\/strong><\/p>\n<\/li>\n These older CVEs have got a CVSS v3 score ranging from 6.1<\/strong> to 9.8<\/strong>.<\/p>\n<\/li>\n Eight out of nine old vulnerabilities were detected by Nessus and Qualys scanners.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n 55% of these old vulnerabilities come under the category of 2020 Top 15 most dangerous software weaknesses.<\/a><\/p>\n<\/h2>\n
Weaponized Vulnerabilities<\/strong><\/h2>\n
\n
Old Vulnerabilities<\/strong><\/h2>\n
\n
CISA Alerts<\/strong><\/h2>\n