philips CVE Vulnerabilities & Metrics

Focus on philips vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About philips Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with philips. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total philips CVEs: 103
Earliest CVE date: 05 Oct 2013, 10:55 UTC
Latest CVE date: 18 Jul 2024, 17:15 UTC

Latest CVE reference: CVE-2023-40704

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 300.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 300.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical philips CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.88

Max CVSS: 10.0

Critical CVEs (≥9): 4

CVSS Range vs. Count

Range Count
0.0-3.9 32
4.0-6.9 53
7.0-8.9 15
9.0-10.0 4

CVSS Distribution Chart

Top 5 Highest CVSS philips CVEs

These are the five CVEs with the highest CVSS scores for philips, sorted by severity first and recency.

All CVEs for philips

CVE-2023-40704 philips vulnerability CVSS: 0 18 Jul 2024, 17:15 UTC

Philips Vue PACS uses default credentials for potentially critical functionality.

CVE-2023-40539 philips vulnerability CVSS: 0 18 Jul 2024, 17:15 UTC

Philips Vue PACS does not require that users have strong passwords, which could make it easier for attackers to compromise user accounts.

CVE-2023-40223 philips vulnerability CVSS: 0 18 Jul 2024, 17:15 UTC

Philips Vue PACS does not properly assign, modify, track, or check actor privileges, creating an unintended sphere of control for that actor.

CVE-2023-40159 philips vulnerability CVSS: 0 18 Jul 2024, 17:15 UTC

A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information.

CVE-2018-8863 philips vulnerability CVSS: 0 09 Nov 2023, 23:15 UTC

The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.

CVE-2021-39369 philips vulnerability CVSS: 0 26 Dec 2022, 06:15 UTC

In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.

CVE-2021-32966 philips vulnerability CVSS: 4.3 25 May 2022, 14:15 UTC

Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials.

CVE-2022-0922 philips vulnerability CVSS: 5.7 01 Apr 2022, 23:15 UTC

The software does not perform any authentication for critical system functionality.

CVE-2021-33024 philips vulnerability CVSS: 5.0 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval.

CVE-2021-33022 philips vulnerability CVSS: 5.0 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CVE-2021-33020 philips vulnerability CVSS: 5.0 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.

CVE-2021-33018 philips vulnerability CVSS: 5.0 01 Apr 2022, 23:15 UTC

The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information.

CVE-2021-27501 philips vulnerability CVSS: 7.5 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.

CVE-2021-27497 philips vulnerability CVSS: 7.5 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

CVE-2021-27493 philips vulnerability CVSS: 6.4 01 Apr 2022, 23:15 UTC

Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.

CVE-2021-43552 philips vulnerability CVSS: 2.1 27 Dec 2021, 19:15 UTC

The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03.

CVE-2021-43550 philips vulnerability CVSS: 3.3 27 Dec 2021, 19:15 UTC

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0.

CVE-2021-43548 philips vulnerability CVSS: 3.3 27 Dec 2021, 19:15 UTC

Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.

CVE-2021-33017 philips vulnerability CVSS: 5.8 27 Dec 2021, 19:15 UTC

The standard access path of the IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) requires authentication, but the product has an alternate path or channel that does not require authentication.

CVE-2021-32993 philips vulnerability CVSS: 5.8 27 Dec 2021, 19:15 UTC

IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

CVE-2021-42744 philips vulnerability CVSS: 2.1 19 Nov 2021, 19:15 UTC

Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access.

CVE-2021-26262 philips vulnerability CVSS: 5.0 19 Nov 2021, 19:15 UTC

Philips MRI 1.5T and MRI 3T Version 5.x.x does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2021-26248 philips vulnerability CVSS: 2.1 19 Nov 2021, 19:15 UTC

Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource.

CVE-2021-39376 philips vulnerability CVSS: 6.5 24 Aug 2021, 13:15 UTC

Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter.

CVE-2021-39375 philips vulnerability CVSS: 6.5 24 Aug 2021, 13:15 UTC

Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the WAdvancedFilter/getDimensionItemsByCode FilterValue parameter.

CVE-2020-27298 philips vulnerability CVSS: 3.3 26 Jan 2021, 18:15 UTC

Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10). The software constructs all or part of an OS command using externally influenced input from an upstream component but does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when sent to a downstream component.

CVE-2018-7580 philips vulnerability CVSS: 5.0 21 Dec 2020, 21:15 UTC

Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub.

CVE-2020-16247 philips vulnerability CVSS: 3.6 18 Sep 2020, 18:15 UTC

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

CVE-2020-16200 philips vulnerability CVSS: 3.3 18 Sep 2020, 18:15 UTC

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2020-16198 philips vulnerability CVSS: 5.8 18 Sep 2020, 18:15 UTC

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. When an attacker claims to have a given identity, the software does not prove or insufficiently proves the claim is correct.

CVE-2020-14525 philips vulnerability CVSS: 2.7 18 Sep 2020, 18:15 UTC

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a webpage that is served to other users.

CVE-2020-14506 philips vulnerability CVSS: 4.3 18 Sep 2020, 18:15 UTC

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.

CVE-2020-16224 philips vulnerability CVSS: 3.3 11 Sep 2020, 14:15 UTC

In Patient Information Center iX (PICiX) Versions C.02, C.03, the software parses a formatted message or structure but does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data, causing the application on the surveillance station to restart.

CVE-2020-16220 philips vulnerability CVSS: 3.3 11 Sep 2020, 14:15 UTC

In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling.

CVE-2020-16216 philips vulnerability CVSS: 6.1 11 Sep 2020, 14:15 UTC

In IntelliVue patient monitors MX100, MX400-550, MX600, MX700, MX750, MX800, MX850, MP2-MP90, and IntelliVue X2 and X3 Versions N and prior, the product receives input or data but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly, which can induce a denial-of-service condition through a system restart.

CVE-2020-16212 philips vulnerability CVSS: 4.6 11 Sep 2020, 14:15 UTC

In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. The application on the surveillance station operates in kiosk mode, which is vulnerable to local breakouts that could allow an attacker with physical access to escape the restricted environment with limited privileges.

CVE-2020-16228 philips vulnerability CVSS: 5.2 11 Sep 2020, 13:15 UTC

In Patient Information Center iX (PICiX) Versions C.02 and C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX550, MX750, MX850, and IntelliVue X3 Versions N and prior, the software does not check or incorrectly checks the revocation status of a certificate, which may cause it to use a compromised certificate.

CVE-2020-16222 philips vulnerability CVSS: 5.8 11 Sep 2020, 13:15 UTC

In Patient Information Center iX (PICiX) Version B.02, C.02, C.03, and PerformanceBridge Focal Point Version A.01, when an actor claims to have a given identity, the software does not prove or insufficiently proves the claim is correct.

CVE-2020-16218 philips vulnerability CVSS: 2.7 11 Sep 2020, 13:15 UTC

In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is then used as a webpage and served to other users. Successful exploitation could lead to unauthorized access to patient data via a read-only web application.

CVE-2020-16214 philips vulnerability CVSS: 5.8 11 Sep 2020, 13:15 UTC

In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software saves user-provided information into a comma-separated value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by spreadsheet software.

CVE-2020-11618 philips vulnerability CVSS: 7.2 31 Aug 2020, 15:15 UTC

THOMSON THT741FTA 2.2.1 and Philips DTR3502BFTA DVB-T2 2.2.1 set-top boxes have their TELNET service hardcoded to start on boot, which allows an attacker on the local network to achieve root access via the TELNET protocol.

CVE-2020-11617 philips vulnerability CVSS: 4.3 31 Aug 2020, 15:15 UTC

The RSS application on THOMSON THT741FTA 2.2.1 and Philips DTR3502BFTA DVB-T2 2.2.1 set-top boxes doesn't validate the SSL certificates of RSS servers, which allows a man-in-the-middle attacker to modify the data delivered to the client.

CVE-2020-16241 philips vulnerability CVSS: 2.1 21 Aug 2020, 13:15 UTC

Philips SureSigns VS4, A.07.107 and prior. The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2020-16239 philips vulnerability CVSS: 4.0 21 Aug 2020, 13:15 UTC

Philips SureSigns VS4, A.07.107 and prior. When an actor claims to have a given identity, the software does not prove or insufficiently proves the claim is correct.

CVE-2020-16237 philips vulnerability CVSS: 2.1 21 Aug 2020, 13:15 UTC

Philips SureSigns VS4, A.07.107 and prior. The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.

CVE-2020-14518 philips vulnerability CVSS: 5.0 21 Aug 2020, 13:15 UTC

Philips DreamMapper, Version 2.24 and prior. Information written to log files can give guidance to a potential attacker.

CVE-2020-7360 philips vulnerability CVSS: 6.9 13 Aug 2020, 19:15 UTC

An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)

CVE-2020-14477 philips vulnerability CVSS: 3.6 26 Jun 2020, 17:15 UTC

In Philips Ultrasound ClearVue Versions 3.2 and prior, Ultrasound CX Versions 5.0.2 and prior, Ultrasound EPIQ/Affiniti Versions VM5.0 and prior, Ultrasound Sparq Version 3.0.2 and prior and Ultrasound Xperius all versions, an attacker may use an alternate path or channel that does not require authentication of the alternate service login to view or modify information.

CVE-2020-12023 philips vulnerability CVSS: 2.7 11 Jun 2020, 20:15 UTC

Philips IntelliBridge Enterprise (IBE), Versions B.12 and prior, IntelliBridge Enterprise system integration with SureSigns (VS4), EarlyVue (VS30) and IntelliVue Guardian (IGS). Unencrypted user credentials received in the IntelliBridge Enterprise (IBE) are logged within the transaction logs, which are secured behind the login based administrative web portal. The unencrypted user credentials sent from the affected products listed above, for the purpose of handshake or authentication with the Enterprise Systems, are logged as the payload in IntelliBridge Enterprise (IBE) within the transaction logs. An attacker with administrative privileges could exploit this vulnerability to read plain text credentials from log files.

CVE-2020-6007 philips vulnerability CVSS: 4.3 23 Jan 2020, 22:15 UTC

Philips Hue Bridge model 2.X prior to and including version 1935144020 contains a Heap-based Buffer Overflow when handling a long ZCL string during the commissioning phase, resulting in a remote code execution.

CVE-2019-18263 philips vulnerability CVSS: 3.3 20 Dec 2019, 16:15 UTC

An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required.

CVE-2019-18241 philips vulnerability CVSS: 3.3 26 Nov 2019, 00:15 UTC

In Philips IntelliBridge EC40 and EC80, IntelliBridge EC40 Hub all versions, and IntelliBridge EC80 Hub all versions, the SSH server running on the affected products is configured to allow weak ciphers. This could enable an unauthorized attacker with access to the network to capture and replay the session and gain unauthorized access to the EC40/80 hub.

CVE-2019-18980 philips vulnerability CVSS: 5.0 14 Nov 2019, 22:15 UTC

On Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices, an unprotected API lets remote users control the bulb's operation. Anyone can turn the bulb on or off, or change its color or brightness remotely. There is no authentication or encryption to use the control API. The only requirement is that the attacker have network access to the bulb.

CVE-2019-13557 philips vulnerability CVSS: 5.0 08 Nov 2019, 18:15 UTC

In Tasy EMR, Tasy WebPortal Versions 3.02.1757 and prior, there is an information exposure vulnerability which may allow a remote attacker to access system and configuration information.

CVE-2019-13546 philips vulnerability CVSS: 7.2 25 Oct 2019, 18:15 UTC

In IntelliSpace Perinatal, Versions K and prior, a vulnerability within the IntelliSpace Perinatal application environment could enable an unauthorized attacker with physical access to a locked application screen, or an authorized remote desktop session host application user to break-out from the containment of the application and access unauthorized resources from the Windows operating system as the limited-access Windows user. Due to potential Windows vulnerabilities, it may be possible for additional attack methods to be used to escalate privileges on the operating system.

CVE-2019-13534 philips vulnerability CVSS: 6.5 12 Sep 2019, 20:15 UTC

Philips IntelliVue WLAN, portable patient monitors, WLAN Version A, Firmware A.03.09, WLAN Version A, Firmware A.03.09, Part #: M8096-67501, WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C) and WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C). The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.

CVE-2019-13530 philips vulnerability CVSS: 6.5 12 Sep 2019, 20:15 UTC

Philips IntelliVue WLAN, portable patient monitors, WLAN Version A, Firmware A.03.09, WLAN Version A, Firmware A.03.09, Part #: M8096-67501, WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C) and WLAN Version B, Firmware A.01.09, Part #: N/A (Replaced by Version C). An attacker can use these credentials to login via ftp and upload a malicious firmware.

CVE-2019-10988 philips vulnerability CVSS: 3.6 04 Sep 2019, 14:15 UTC

In Philips HDI 4000 Ultrasound Systems, all versions running on old, unsupported operating systems such as Windows 2000, the HDI 4000 Ultrasound System is built on an old operating system that is no longer supported. Thus, any unmitigated vulnerability in the old operating system could be exploited to affect this product.

CVE-2019-10968 philips vulnerability CVSS: 2.1 24 Jul 2019, 15:15 UTC

Philips Holter 2010 Plus, all versions. A vulnerability has been identified that may allow system options that were not purchased to be enabled.

CVE-2019-6562 philips vulnerability CVSS: 3.5 01 May 2019, 19:29 UTC

In Philips Tasy EMR, Tasy EMR Versions 3.02.1744 and prior, the software incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE-2018-19001 philips vulnerability CVSS: 4.6 07 Dec 2018, 14:29 UTC

Philips HealthSuite Health Android App, all versions. The software uses simple encryption that is not strong enough for the level of protection required.

CVE-2018-17906 philips vulnerability CVSS: 3.3 19 Nov 2018, 20:29 UTC

Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.

CVE-2018-8856 philips vulnerability CVSS: 5.0 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software contains hard-coded cryptographic key, which it uses for encryption of internal data.

CVE-2018-8854 philips vulnerability CVSS: 5.0 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software does not properly restrict the size or amount of resources requested or influenced by an actor, which can be used to consume more resources than intended.

CVE-2018-8852 philips vulnerability CVSS: 6.8 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. When authenticating a user or otherwise establishing a new user session, the software gives an attacker the opportunity to steal authenticated sessions without invalidating any existing session identifier.

CVE-2018-8850 philips vulnerability CVSS: 7.5 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software does not validate input properly, allowing an attacker to craft the input in a form that is not expected by the rest of the application. This would lead to parts of the unit receiving unintended input, which may result in altered control flow, arbitrary control of a resource, or arbitrary code execution.

CVE-2018-8848 philips vulnerability CVSS: 5.0 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.

CVE-2018-8846 philips vulnerability CVSS: 4.3 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is then served to other users.

CVE-2018-8844 philips vulnerability CVSS: 6.8 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CVE-2018-8842 philips vulnerability CVSS: 3.3 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The Philips e-Alert communication channel is not encrypted which could therefore lead to disclosure of personal contact information and application login credentials from within the same subnet.

CVE-2018-14803 philips vulnerability CVSS: 5.0 26 Sep 2018, 19:29 UTC

Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The Philips e-Alert contains a banner disclosure vulnerability that could allow attackers to obtain extraneous product information, such as OS and software components, via the HTTP response header that is normally not available to the attacker, but might be useful information in an attack.

CVE-2018-14801 philips vulnerability CVSS: 7.2 22 Aug 2018, 18:29 UTC

In Philips PageWriter TC10, TC20, TC30, TC50, TC70 Cardiographs, all versions prior to May 2018, an attacker with both the superuser password and physical access can enter the superuser password that can be used to access and modify all settings on the device, as well as allow the user to reset existing passwords.

CVE-2018-14799 philips vulnerability CVSS: 4.6 22 Aug 2018, 18:29 UTC

In Philips PageWriter TC10, TC20, TC30, TC50, TC70 Cardiographs, all versions prior to May 2018, the PageWriter device does not sanitize data entered by user. This can lead to buffer overflow or format string vulnerabilities.

CVE-2018-14789 philips vulnerability CVSS: 4.6 22 Aug 2018, 18:29 UTC

In Philips' IntelliSpace Cardiovascular (ISCV) products (ISCV Version 3.1 or prior and Xcelera Version 4.1 or prior), an unquoted search path or element vulnerability has been identified, which may allow an attacker to execute arbitrary code and escalate their level of privileges.

CVE-2018-14787 philips vulnerability CVSS: 4.6 22 Aug 2018, 18:29 UTC

In Philips' IntelliSpace Cardiovascular (ISCV) products (ISCV Version 2.x or prior and Xcelera Version 4.1 or prior), an attacker with escalated privileges could access folders which contain executables where authenticated users have write permissions, and could then execute arbitrary code with local administrative permissions.

CVE-2017-3210 philips vulnerability CVSS: 7.2 24 Jul 2018, 15:29 UTC

Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.

CVE-2018-10601 philips vulnerability CVSS: 5.4 05 Jun 2018, 20:29 UTC

IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that exposes an "echo" service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.

CVE-2018-10599 philips vulnerability CVSS: 2.9 05 Jun 2018, 20:29 UTC

IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.

CVE-2018-10597 philips vulnerability CVSS: 5.4 05 Jun 2018, 20:29 UTC

IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to access memory ("write-what-where") from an attacker-chosen device address within the same subnet.

CVE-2018-8861 philips vulnerability CVSS: 6.8 04 May 2018, 17:29 UTC

Vulnerabilities within the Philips Brilliance CT kiosk environment (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) could enable a limited-access kiosk user or an unauthorized attacker to break-out from the containment of the kiosk environment, attain elevated privileges from the underlying Windows OS, and access unauthorized resources from the operating system.

CVE-2018-8857 philips vulnerability CVSS: 7.2 04 May 2018, 17:29 UTC

Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. An attacker could compromise these credentials and gain access to the system.

CVE-2018-8853 philips vulnerability CVSS: 7.2 04 May 2018, 17:29 UTC

Philips Brilliance CT devices operate user functions from within a contained kiosk in a Microsoft Windows operating system. Windows boots by default with elevated Windows privileges, enabling a kiosk application, user, or an attacker to potentially attain unauthorized elevated privileges in Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior. Also, attackers may gain access to unauthorized resources from the underlying Windows operating system.

CVE-2017-9656 philips vulnerability CVSS: 6.5 24 Apr 2018, 15:29 UTC

The backend database of the Philips DoseWise Portal application versions 1.1.7.333 and 2.1.1.3069 uses hard-coded credentials for a database account with privileges that can affect confidentiality, integrity, and availability of the database. For an attacker to exploit this vulnerability, elevated privileges are first required for an attacker to access the web application backend system files that contain the hard-coded credentials. Successful exploitation may allow a remote attacker to gain access to the database of the DWP application, which contains PHI. CVSS v3 base score: 9.1, CVSS vector string: AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H.

CVE-2017-9654 philips vulnerability CVSS: 4.0 24 Apr 2018, 15:29 UTC

The Philips DoseWise Portal web-based application versions 1.1.7.333 and 2.1.1.3069 stores login credentials in clear text within backend system files. CVSS v3 base score: 6.5, CVSS vector string: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.

CVE-2018-7498 philips vulnerability CVSS: 5.0 28 Mar 2018, 17:29 UTC

In Philips Alice 6 System version R8.0.2 or prior, the lack of proper data encryption passes up the guarantees of confidentiality, integrity, and accountability that properly implemented encryption conveys.

CVE-2018-5451 philips vulnerability CVSS: 7.5 28 Mar 2018, 17:29 UTC

In Philips Alice 6 System version R8.0.2 or prior, when an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or the ability to execute arbitrary code.

CVE-2018-5474 philips vulnerability CVSS: 7.5 26 Mar 2018, 14:29 UTC

Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.

CVE-2018-5472 philips vulnerability CVSS: 7.5 26 Mar 2018, 14:29 UTC

Philips Intellispace Portal all versions 7.0.x and 8.0.x have an insecure windows permissions vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code.

CVE-2018-5470 philips vulnerability CVSS: 7.2 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an unquoted search path or element vulnerability that has been identified, which may allow an authorized local user to execute arbitrary code and escalate their level of privileges.

CVE-2018-5468 philips vulnerability CVSS: 7.5 26 Mar 2018, 14:29 UTC

Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code

CVE-2018-5466 philips vulnerability CVSS: 5.0 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a self-signed SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.

CVE-2018-5464 philips vulnerability CVSS: 5.0 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an untrusted SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.

CVE-2018-5462 philips vulnerability CVSS: 5.0 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.

CVE-2018-5458 philips vulnerability CVSS: 5.0 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a vulnerability using SSL legacy encryption that could allow an attacker to gain unauthorized access to resources and information.

CVE-2018-5454 philips vulnerability CVSS: 6.8 26 Mar 2018, 14:29 UTC

Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime.

CVE-2018-5438 philips vulnerability CVSS: 3.3 20 Mar 2018, 17:29 UTC

Philips ISCV application prior to version 2.3.0 has an insufficient session expiration vulnerability where an attacker could reuse the session of a previously logged in user. This vulnerability exists when using ISCV together with an Electronic Medical Record (EMR) system, where ISCV is in KIOSK mode for multiple users and using Windows authentication. This may allow an attacker to gain unauthorized access to patient health information and potentially modify this information.

CVE-2017-14111 philips vulnerability CVSS: 4.0 17 Nov 2017, 20:29 UTC

The workstation logging function in Philips IntelliSpace Cardiovascular (ISCV) 2.3.0 and earlier and Xcelera R4.1L1 and earlier records domain authentication credentials, which if accessed allows an attacker to use credentials to access the application, or other user entitlements.

CVE-2017-14797 philips vulnerability CVSS: 7.9 01 Oct 2017, 01:29 UTC

Lack of Transport Encryption in the public API in Philips Hue Bridge BSB002 SW 1707040932 allows remote attackers to read API keys (and consequently bypass the pushlink protection mechanism, and obtain complete control of the connected accessories) by leveraging the ability to sniff HTTP traffic on the local intranet network.

CVE-2017-0199 philips vulnerability CVSS: 9.3 12 Apr 2017, 14:59 UTC

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."

CVE-2015-2884 philips vulnerability CVSS: 5.0 10 Apr 2017, 03:59 UTC

Philips In.Sight B120/37 allows remote attackers to obtain sensitive information via a direct request, related to yoics.net URLs, stream.m3u8 URIs, and cam_service_enable.cgi.

CVE-2015-2883 philips vulnerability CVSS: 3.5 10 Apr 2017, 03:59 UTC

Philips In.Sight B120/37 has XSS, related to the Weaved cloud web service, as demonstrated by the name parameter to deviceSettings.php or shareDevice.php.

CVE-2015-2882 philips vulnerability CVSS: 10.0 10 Apr 2017, 03:59 UTC

Philips In.Sight B120/37 has a password of b120root for the backdoor root account, a password of /ADMIN/ for the backdoor admin account, a password of merlin for the backdoor mg3500 account, a password of M100-4674448 for the backdoor user account, and a password of M100-4674448 for the backdoor admin account.

CVE-2017-0143 philips vulnerability CVSS: 9.3 17 Mar 2017, 00:59 UTC

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

CVE-2013-2808 philips vulnerability CVSS: 9.3 05 Oct 2013, 10:55 UTC

Heap-based buffer overflow in Xper in Philips Xper Information Management Physiomonitoring 5 components, Xper Information Management Vascular Monitoring 5 components, and Xper Information Management servers and workstations for Flex Cardio products before XperConnect 1.5.4.053 SP2 allows remote attackers to execute arbitrary code via a crafted HTTP request to the Connect broker on TCP port 6000.