Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-16220

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-11 Sep, 2020 | 13:11
Updated At-04 Aug, 2024 | 13:37
Rejected At-
Credits

Philips Patient Monitoring Devices Improper Validation of Syntactic Correctness of Input

In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:11 Sep, 2020 | 13:11
Updated At:04 Aug, 2024 | 13:37
Rejected At:
▼CVE Numbering Authority (CNA)
Philips Patient Monitoring Devices Improper Validation of Syntactic Correctness of Input

In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling.

Affected Products
Vendor
PhilipsPhilips
Product
Patient Information Center iX (PICiX)
Default Status
unaffected
Versions
Affected
  • C.02
  • C.03
Vendor
PhilipsPhilips
Product
PerformanceBridge Focal Point
Default Status
unaffected
Versions
Affected
  • A.01
Problem Types
TypeCWE IDDescription
CWECWE-1286CWE-1286 Improper Validation of Syntactic Correctness of Input
Type: CWE
CWE ID: CWE-1286
Description: CWE-1286 Improper Validation of Syntactic Correctness of Input
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Philips released the following versions to remediate reported vulnerabilities: * Patient Information Center iX (PICiX) Version C.03 * PerformanceBridge Focal Point * Certificate revocation within the system was implemented for PIC iX and Performance Bridge FocalPoint.

Configurations

Workarounds

As a mitigation to these vulnerabilities, Philips recommends the following: * The Philips patient monitoring network is required to be physically or logically isolated from the hospital local area network (LAN). Philips recommends using a firewall or routers that can implement access control lists restricting access in and out of the patient monitoring network for only necessary ports and IP addresses. Refer to the Philips Patient Monitoring System Security for Clinical Networks guide for additional information on InCenter https://incenter.medical.philips.com/ . * By default, the simple certificate enrollment protocol (SCEP) service is not running. When needed, the service is configured to run based on the duration or the number of certificates to be assigned. One certificate is default, but if a certificate is not issued, the service will continue to run. Limit exposure by ensuring the SCEP service is not running unless it is actively being used to enroll new devices. * When enrolling new devices using SCEP, enter a unique challenge password of 8-12 unpredictable and randomized digits. * Implement physical security controls to prevent unauthorized login attempts on the PIC iX application. Servers should be kept in controlled locked data centers. Access to equipment at nurses’ stations should be controlled and monitored. * Only grant remote access to PIC iX servers on a must-have basis. * Grant login privileges to the bedside monitor and PIC iX application on a role-based, least-privilege basis, and only to trusted users. Users with questions regarding their specific Philips Patient Information Center (PIC iX) and/or IntelliVue patient monitor installations and new release eligibility should contact their local Philips service support team, or regional service support https://www.usa.philips.com/healthcare/solutions/customer-service-solutions , or call 1-800-722-9377. Please see the Philips product security website https://www.philips.com/productsecurity for the Philips advisory and the latest security information for Philips products.

Exploits

Credits

finder
Julian Suleder, Nils Emmerich, Birk Kauer of ERNW Research GmbH, Dr. Oliver Matula of ERNW Enno, and Rey Netzwerke GmbH reported these vulnerabilities to the Federal Office for Information Security (BSI), Germany, in the context of the BSI project ManiMed (Manipulation of medical devices), which reported these to Philips.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
x_refsource_MISC
https://www.philips.com/productsecurity
N/A
Hyperlink: https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
Resource:
x_refsource_MISC
Hyperlink: https://www.philips.com/productsecurity
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
x_refsource_MISC
x_transferred
https://www.philips.com/productsecurity
x_transferred
Hyperlink: https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.philips.com/productsecurity
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:11 Sep, 2020 | 14:15
Updated At:12 Dec, 2023 | 21:15

In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Primary2.03.3LOW
AV:A/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Primary
Version: 2.0
Base score: 3.3
Base severity: LOW
Vector:
AV:A/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Philips
philips
>>patient_information_center_ix>>b.02
cpe:2.3:a:philips:patient_information_center_ix:b.02:*:*:*:*:*:*:*
Philips
philips
>>patient_information_center_ix>>c.02
cpe:2.3:a:philips:patient_information_center_ix:c.02:*:*:*:*:*:*:*
Philips
philips
>>patient_information_center_ix>>c.03
cpe:2.3:a:philips:patient_information_center_ix:c.03:*:*:*:*:*:*:*
Philips
philips
>>performancebridge_focal_point>>a.01
cpe:2.3:a:philips:performancebridge_focal_point:a.01:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1286Primaryics-cert@hq.dhs.gov
CWE ID: CWE-1286
Type: Primary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://www.philips.com/productsecurityics-cert@hq.dhs.gov
N/A
Hyperlink: https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.philips.com/productsecurity
Source: ics-cert@hq.dhs.gov
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found