Philips Tasy EMR (Update A)
Philips Tasy EMR and Tasy WebPortal contain input validation vulnerabilities (CWE-79 cross-site scripting and CWE-200 information exposure) that could allow an authenticated attacker to execute arbitrary code, alter control flow, or access sensitive patient information. The vulnerabilities affect Tasy EMR versions 3.02.1744 and prior, and Tasy WebPortal versions 3.02.1757 and prior. An attacker with valid login credentials could exploit these issues to compromise patient confidentiality and system integrity.
- Valid user credentials for Tasy EMR or WebPortal
- Network access to the Tasy application (internal network for on-premise installations)
- Knowledge of application input fields vulnerable to injection
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1bbd7366-6fb5-4ce9-8389-d47185c78621Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.