SB2018083106 - Multiple vulnerabilities in Philips e-Alert Unit
Published: August 31, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2018-8846)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Resource exhaustion (CVE-ID: CVE-2018-8854)
The disclosed vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to improper restriction of the size or amount of resources requested or influenced by an actor. A remote attacker can consume more resources than intended and cause the service to crash.
3) Security restrictions bypass (CVE-ID: CVE-2018-8848)
The disclosed vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to the software, upon installation, sets incorrect permissions for an object. A remote attacker can bypass security restrictions to conduct further attacks.
4) Information disclosure (CVE-ID: CVE-2018-14803)
The disclosed vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a banner disclosure. A remote attacker can use the HTTP response header that is normally not available to the attacker and obtain extraneous product information, such as OS and software components.
5) Cross-site request forgery (CVE-ID: CVE-2018-8844)
The disclosed vulnerability allows a remote attacker to perform CSRF attacks.
The vulnerability exists due to the web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. A remote attacker can trick the victim into visiting a specially crafted specially crafted HTML page or URL, conduct cross-site request forgery attack and perform arbitrary actions.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.