Philips Vue PACS (Update B)
Philips Vue PACS and related products contain multiple vulnerabilities including improper input validation (CWE-20), buffer overflows (CWE-119), insufficient authentication (CWE-287), use of broken cryptography (CWE-319, CWE-324), and improper configuration (CWE-693). These vulnerabilities allow unauthorized access, data eavesdropping, modification, code execution, and unauthorized software installation. The vulnerabilities affect Vue PACS, Vue Motion, Vue MyVue, and Vue Speech products.
- System must be running a vulnerable version (12.2.x.x or earlier)
Philips recommends configuring the Vue PACS environment per D000763414 - Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter. Philips released Version 12.2.1.5 in June of 2020 for MyVue that remediates CWE-693 and recommends contacting support below. Philips released Version 12.2.1.5 in June of 2020 for Vue Motion that remediates CWE-324 and recommends contacting support below. Philips released Version 12.2.8.0 in May of 2021 for Speech that remediates CWE-693, CWE-319, CWE-119, CWE-287, and CWE-1214 and recommends contacting support below. Philips released Version 12.2.8.0 in May of 2021 for PACS that remediates CWE-20, CWE-119, CWE-287 and recommends contacting support below.
/api/v1/advisories/16accf5c-c160-4900-ad2e-d34ede35aea6