US cybersecurity agency reports critical vulnerabilities in Philips' Vue PACS

A U.S. government cybersecurity agency has found multiple vulnerabilities in a Philips picture archiving and communication system that could give bad actors access to sensitive data and software.

The U.S. Cybersecurity and Infrastructure Security Agency warned that Philips’ Vue PACS can be remotely exploited through relatively low complexity attacks. It identified 15 specific flaws that apply to the following products:

  • Vue PACS versions 12.2.x.x and prior.
  • Vue MyVue versions 12.2.x.x and prior.
  • Vue Speech versions 12.2.x.x and prior.
  • Vue Motion versions 12.2.1.5 and prior.

“Successful exploitation of these vulnerabilities could allow an unauthorized person or process to eavesdrop, view or modify data, gain system access, perform code execution, install unauthorized software, or affect system data integrity in such a way as to negatively impact the confidentiality, integrity, or availability of the system,” the CISA, part of the Department of Homeland Security, said in a July 6 advisory.

The four most serious problems have been assigned a Common Vulnerability Scoring System score of 9.8, indicating a “critical” problem. Such concerns are related to improper input data validation and flaws brought over via previous patches.

Additionally, the Vue platform’s use of expired cryptographic keys has earned a CVSS score of 8.2, and “significantly” diminishes system safety.

Insufficiently protected credentials, data integrity issues, and protection mechanism failures are also listed among problems with the Dutch healthcare giant’s platform.

Philips was the first to report these security concerns to the CISA and has already fixed a number of vulnerabilities in June 2020 and May 2021 updates. Further actions will be taken in version updates released in Q1 2022.

In the meantime, the government organization recommends users minimize network exposure for all control systems and ensure they aren’t accessible from the internet. The group further suggests locating control systems behind firewalls and using VPNs for remote access.

“CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures,” the security agency said July 6.

""

Matt joined Chicago’s TriMed team in 2018 covering all areas of health imaging after two years reporting on the hospital field. He holds a bachelor’s in English from UIC, and enjoys a good cup of coffee and an interesting documentary.

Around the web

CMS has more than doubled the CCTA payment rate from $175 to $357.13. The move, expected to have a significant impact on the utilization of cardiac CT, received immediate praise from imaging specialists.

The newly cleared offering, AutoChamber, was designed with opportunistic screening in mind. It can evaluate many different kinds of CT images, including those originally gathered to screen patients for lung cancer. 

AI-enabled coronary plaque assessments deliver significant value, according to late-breaking data presented at TCT. These AI platforms have gained considerable momentum in recent months, receiving expanded Medicare coverage in addition to a new Category I CPT code.

Trimed Popup
Trimed Popup