#VU23765 Inadequate Encryption Strength


Published: 2019-12-20

Vulnerability identifier: #VU23765

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-18263

CWE-ID: CWE-326

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Veradius Unity
Hardware solutions / Medical equipment
BV Pulsera
Hardware solutions / Medical equipment
BV Endura
Hardware solutions / Medical equipment

Vendor: Philips

Description

The vulnerability allows a remote attacker to compromise the management interface of the front end router.

The vulnerability exists due to the router software uses an encryption scheme that is not strong enough for the level of protection required. A remote attacker on the local network can compromise the management interface of the front end router impacting the availability of data transfer via wireless communication.

This vulnerability affects the following products:

  • Veradius Unity with wireless option (shipped between 2016-August 2018)
  • Veradius Unity with ViewForum option (shipped between 2016-August 2018)
  • Pulsera and Endura with wireless option (shipped between 26-June-2017 through 07-August 2018)
  • Pulsera and Endura with ViewForum option (shipped between 26-June-2017 through 07-August 2018)

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Veradius Unity: All versions

BV Pulsera: All versions

BV Endura: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsma-19-353-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability