Multiple vulnerabilities in Philips MRI 1.5T and 3T



Published: 2021-11-19
Risk Low
Patch available NO
Number of vulnerabilities 3
CVE-ID CVE-2021-3083
CVE-2021-3085
CVE-2021-3084
CWE-ID CWE-284
CWE-708
CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
MRI 1.5T
Hardware solutions / Medical equipment

MRI 3T
Hardware solutions / Medical equipment

Vendor Philips

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU58257

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-3083

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

MRI 1.5T: 5.0

MRI 3T: 5.0


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsma-21-313-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Incorrect Ownership Assignment

EUVDB-ID: #VU58258

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-3085

CWE-ID: CWE-708 - Incorrect Ownership Assignment

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to the affected software assigns an owner who is outside the intended control sphere to a resource. A local attacker can gain access to sensitive information on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

MRI 1.5T: 5.0

MRI 3T: 5.0


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsma-21-313-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU58259

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-3084

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

MRI 1.5T: 5.0

MRI 3T: 5.0


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsma-21-313-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###