ID CVE-2017-9658
Summary Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
References
Vulnerable Configurations
  • cpe:2.3:o:philips:intellivue_mx40_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:philips:intellivue_mx40_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:philips:intellivue_mx40:-:*:*:*:*:*:*:*
    cpe:2.3:h:philips:intellivue_mx40:-:*:*:*:*:*:*:*
CVSS
Base: 6.1 (as of 09-10-2019 - 23:30)
Impact:
Exploitability:
CWE CWE-755
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:A/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bid 100813
confirm https://www.usa.philips.com/healthcare/about/customer-support/product-security
misc https://ics-cert.us-cert.gov/advisories/ICSMA-17-255-01
Last major update 09-10-2019 - 23:30
Published 30-04-2018 - 15:29
Last modified 09-10-2019 - 23:30
Back to Top