ESB-2017.2901 - [Win] IntelliSpace Cardiovascular System and Xcelera: Administrator compromise - Existing account 2017-11-15

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2901
Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability
                             15 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IntelliSpace Cardiovascular System
                   Xcelera
Publisher:         Philips
Operating System:  Windows
Impact/Access:     Administrator Compromise -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-14111  

Original Bulletin: 
   https://ics-cert.us-cert.gov/advisories/ICSMA-17-318-01

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSMA-17-318-01)
Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability
Original release date: November 14, 2017

All information products included in http://ics-cert.us-cert.gov are provided
"as is" for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see http://www.us-cert.gov/tlp/.

OVERVIEW

Philips reported a vulnerability in the Philips’ IntelliSpace Cardiovascular
and Xcelera cardiac image and information management systems. Philips has
produced updates that mitigate this vulnerability in the affected products.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

Philips reports that the vulnerability affects the following versions of the
IntelliSpace Cardiovascular and Xcelera cardiac image and information
management systems:

IntelliSpace Cardiovascular, Version 2.3.0 and prior, and Xcelera, R4.1L1 and prior.

IMPACT

Successful exploitation of this vulnerability could allow an attacker to gain
unauthorized access to sensitive information stored on the system, modify
device configuration, and gain access to connected devices.

Impact to individual organizations depends on many factors that are unique to
each organization. NCCIC/ICS-CERT recommends that organizations evaluate the
impact of this vulnerability based on their operational environment and
specific clinical usage.

BACKGROUND

Philips is a global company that maintains offices in many countries around the
world, including countries in Africa, Asia, Europe, Latin America, the Middle
East, and North America.

The Philips IntelliSpace Cardiovascular and Xcelera systems (a predecessor to
IntelliSpace Cardiovascular) are comprehensive cardiac image and information
management software.

According to Philips, IntelliSpace Cardiovascular and Xcelera systems are
deployed across the Healthcare and Public Health sector. Philips estimates
these products are used worldwide.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

CWE-522: INSUFFICIENTLY PROTECTED CREDENTIALS[a]
Credentials are stored in cleartext in system files that may allow an attacker
with elevated privileges to gain unauthorized access to data to include patient
health information, system resources, and misuse of connected assets.
CVE-2017-14111 [b] has been assigned to this vulnerability. A CVSS v3 base score
of 7.2 has been assigned; the CVSS vector string is
(CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).[c]

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a low skill level would be able to exploit this vulnerability.

MITIGATION

Philips is producing software hotfix updates for all IntelliSpace
Cardiovascular and latest Xcelera versions, some of which are available upon
request, while other versions are in the process of development and are
expected to be completed by the end of 2017.

Philips has initiated a voluntary medical device correction aligned with
IntelliSpace Cardiovascular proactive field change order (reference
FCO83000202) to be issued as IntelliSpace Cardiovascular updates become
available.

Users with questions regarding their specific IntelliSpace Cardiovascular or
Xcelera installations are advised by Philips to contact their local Philips
service support team or their regional service support. Philips’ contact
information is available at the following location:
http://www.usa.philips.com/healthcare/solutions/customer-service-solutions

Please see the Philips product security web site for the latest security
information for Philips products:
https://www.philips.com/productsecurity

ICS-CERT recommends that users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. Specifically, users should:
- - Minimize network exposure for all medical devices and/or systems, and ensure
  that they are not accessible from the Internet.
- - Locate all medical devices and remote devices behind firewalls, and isolate
  them from the business network.
- - When remote access is required, use secure methods, such as Virtual Private
  Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be
  updated to the most current version available. Also recognize that VPN is
  only as secure as the connected devices.

ICS-CERT also provides a section for security recommended practices on the
ICS-CERT web page at http://ics-cert.us-cert.gov/content/recommended-practices.
ICS-CERT reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

Additional mitigation guidance and recommended practices are publicly available
in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber
Intrusion Detection and Mitigation Strategies, that is available for download
from the ICS-CERT web site (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to ICS-CERT for
tracking and correlation against other incidents.

a. CWE-522: Insufficiently Protected Credentials,
  http://cwe.mitre.org/data/definitions/522.html, web site last accessed November
  14, 2017.
b. NVD, https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14111, NIST uses
  this advisory to create the CVE web site report. This web site will be active
  sometime after publication of this advisory.
c. CVSS Calculator,
  https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,
  web site last accessed November 14, 2017.

Contact Information
For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov (link sends e-mail)
Toll Free: 1-877-776-7585
International Callers: (208) 526-0900
For industrial control systems security information and incident reporting:
http://ics-cert.us-cert.gov

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lQiY
-----END PGP SIGNATURE-----

« Back to bulletins