Philips e-Alert Unit
Philips e-Alert Unit versions R2.1 and earlier contain multiple input validation, cross-site scripting, information disclosure, and resource exhaustion vulnerabilities. An attacker on the same subnet can send malicious input to the unit without authentication to steal user contact data, alter unit configuration, or trigger a denial of service. Version R2.1 (June 2018) fixed four of the eight CWEs; Philips planned a further update for end of 2018 to address the remaining issues including cross-site scripting, weak cryptography, and rate limiting.
- Attacker must be on the same subnet as the e-Alert unit
- Network access to the e-Alert unit's web interface or listening ports
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4c07a3ac-1294-40b6-8fc7-161e55ffd164Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.