Publication Date: 2020 December 14 Update Date: 2021 January 22 Begin Update A: 2021 January 13 Philips does not utilize Solarwinds in an external facing capacity when servicing or monitoring medical devices through Philips Remote Service Network (RSN/PRS). Begin Update B: 2021 January 22 To date, Philips’s review has not identified products affected by the Solarwinds software vulnerabilities. Philips does not utilize Solarwinds in an external facing capacity when servicing or monitoring medical devices through Philips Remote Service Network (RSN/PRS). Our review and analysis is ongoing.
Philips is currently monitoring developments related to recent reports of a security breach affecting the SolarWinds Orion Platform software.
Our global security teams are analyzing updates from SolarWinds, in the event that this issue may potentially be related to known security vulnerabilities.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our solutions. The company is a recognized leader in health technology cybersecurity. As part of the global Philips Product Security Policy, the company conducts extensive, ongoing analysis of our solutions, often in collaboration with customers, researchers, and government agencies.
End Update A
End Update B
Publication Date: 10 December 2020 Update Date: 10 December 2020 At this time, Philips does not utilize services from FireEye. Our global security teams are analyzing updates from FireEye regarding its cybersecurity tools that may have been compromised, and their potential relation to known security vulnerabilities.
Philips is currently monitoring developments related to recent reports of a security breach affecting U.S. security firm FireEye.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our solutions. The company is a recognized leader in health technology cybersecurity. As part of the global Philips Product Security Policy, the company conducts extensive, ongoing analysis of our solutions, often in collaboration with customers, researchers, and government agencies.
Publication Date: 2020 December 9 Update Date: 2021 January 21 Philips is currently monitoring developments and updates related to the recently published U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) advisory (ICSA-20-343-01) concerning 33 reported vulnerabilities found in multiple open-source software TCP/IP stacks, referred to as “Amnesia33”. According to CISA, successful exploitation of these vulnerabilities could allow attackers to corrupt memory, put devices into infinite loops, access unauthorized data, and/or poison DNS cache. As part of the Philips product security policy and protocols, Philips’ teams are evaluating the affected TCP/IP third-party products listed in the CISA advisory, and their potential relation to known security issues, to determine if remediation for Philips products may be required. The TCP/IP suppliers of these third-party products have provided mitigations in the CISA advisory. Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our solutions. The company is a recognized leader in health technology cybersecurity. As part of the global Philips Product Security Policy, the company conducts extensive, ongoing analysis of our solutions, often in collaboration with customers, researchers, and government agencies. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Begin Update A: 2021 January 21 To date, Philips’s review has not identified products affected by the Amnesia33 software vulnerabilities. Our review and analysis is ongoing.
End Update A
Publication Date: 3 November 2020 Update Date: 5 November 2020 Oracle released a critical patch update in October 2020 for CVE-2020-14882. Oracle is addressing the most recent vulnerability CVE-2020-14750 by release of an emergency patch on November 1. Philips is currently in the process of evaluating the Oracle patch and vendor recommended mitigation options. According to Oracle, the vulnerability is remotely exploitable without authentication over a network without the need for a username and password. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. As the advisory posted is updated by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1350. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Philips is currently monitoring developments and updates related to the Oracle WebLogic Server Advisory (CVE-2020-14750). The advisory highlighted a critical remote code execution (RCE) vulnerability impacting multiple Oracle WebLogic Server versions and is related to CVE-2020-14882.
As reported by Oracle, unauthenticated attackers can remotely exploit this no-auth RCE flaw in the server’s console component via HTTP, without user interaction, as part of low complexity attacks to potentially take over targeted servers. Oracle WebLogic Server versions that are affected by CVE-2020-14750 include 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0.
As part of product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Oracle WebLogic Server for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for updates related to these vulnerabilities and evaluating further possible actions as needed.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Begin Update A: 5 November 2020
Tasy EMR v12.2.1.3*
**Information or patch available in Incenter ***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure End Update A
*Software only products with customer owned Operating Systems
Publication Date: 29 October 2020 Update Date: 29 October 2020 Philips is currently monitoring developments and updates related to the recent joint cybersecurity advisory coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS), which is related to recent ransomware attacks on healthcare organizations. The advisory highlighted Ryuk ransomware campaign's threat, which exploits the Microsoft Netlogon vulnerability (CVE-2020-1472). The Microsoft netlogon vulnerability is an escalation of privilege vulnerability. As reported by Microsoft, an elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. As part of product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further possible actions as needed. Microsoft is addressing the vulnerability in a phased two-part rollout, the first part Microsoft released a patch in August, with the second part projected for early next year. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. Philips is currently in the process of evaluating the Microsoft patch and vendor recommended mitigation options. According to Microsoft, to exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. As the Zerologon advisory posted on www.philips.com/productsecurity is updated by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Publication Date: 13 October 2020 Update Date: 13 October 2020 Philips is currently monitoring developments and updates related to the Microsoft security advisory issued on 13 October 2020. The advisory highlighted a remote code execution vulnerability that affects multiple versions of the Windows 10 and Windows Server operating systems. This vulnerability, also referred to as “Bad Neighbor”, resides in the way Windows handles ICMPv6 Router Advertisement packets, and could allow a remote attacker to execute code on an affected system. As part of product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further possible actions as needed. Microsoft provided a security update. Philips is currently in the process of evaluating the Microsoft patch and vendor recommended mitigation options. According to Microsoft, to exploit the vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. As the advisory is updated by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Publication Date: 14 September 2020 Update Date: 29 October 2020 Philips is currently monitoring developments and updates related to the recent Microsoft alert concerning escalation of privilege vulnerability (CVE-2020-1472) in Microsoft’s Netlogon. As reported by Microsoft, an elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further possible actions as needed. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. Philips is currently in the process of evaluating the Microsoft patch and vendor recommended mitigation options. According to Microsoft, to exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Begin Update B: 29 October 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1472. However, the list below is not comprehensive and may be updated as necessary if more products are identified.
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Clinical Collaboration Platform officially registered as Vue PACS**** | Illumeo 2.0** | IntelliSpace ECG Management System B.00 (IECG)* |
Intellispace PACS (4.4, 5.5x)*** | IntelliSpace Discovery 2.0** | IntelliSpace Portal Server (9.0, 10.0)** |
UDM (1.1, 2.2) | XIRIS (8.2, 8.3) | |
*Software only products with customer owned Operating Systems. **Information or patch available in Incenter. ***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure. **** Only those installs with Veritas Cluster Manager Software installed. Note: Philips is continuing to assess the Microsoft patch for Philips’ products and services that use remote desktop services. Philips will use Incenter as the communication mechanism for necessary mitigation or remediation. End Update B Begin Update A: 5 October 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1472. However, the list below is not comprehensive and may be
For customers who utilize the Remote Services Network (RSN, PRS), all Philips RSN systems are fully protected against this vulnerability and customers are advised not to disconnect the PRS as it may impact Philips service teams from providing any required immediate and proactive support such as remote patching.
Clinical Collaboration Platform officially registered as Vue PACS**** | Illumeo 2.0** | IntelliSpace ECG Management System B.00 (IECG)* |
Intellispace PACS (4.4, 5.5x)*** | IntelliSpace Discovery 2.0** | IntelliSpace Portal Server (9.0, 10.0)** |
UDM (1.1, 2.2) | XIRIS (8.2, 8.3) | |
updated as necessary if more products are identified. *Software only products with customer owned Operating Systems. **Information or patch available in Incenter. ***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure. **** Only those installs with Veritas Cluster Manager Software installed. End Update A
Publication Date: September 17, 2020 Update Date: September 17, 2020 Philips is a committed leader in medical device cybersecurity. As part of our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. In accordance with Philips’ Coordinated Vulnerability Disclosure Policy for the awareness and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding the Philips Clinical Collaboration Platform Portal (officially registered as Vue PACS). Philips confirmed 5 vulnerabilities in a range of low- to medium-severity (CVSS 3.4-6.8) associated with the Philips Clinical Collaboration Platform Portal (officially registered as Vue PACS), affecting versions 12.2.1 and prior. These include potential exploits relating to input and data validation verification, resource allocation limitation, and access configuration, among others. This potential issue requires a high skill level to exploit, and there are currently no known public exploits available. To date, Philips has not received any reports of exploitation of this vulnerability or of incidents from clinical use that we have been able to associate with this issue. Successful exploitation of these issues could allow an attacker to lead a user into executing potentially unauthorized actions or provides the attacker with identifying information that could be used for subsequent attacks. Philips released a patch in June 2020, for Clinical Collaboration Platform Portal (officially registered as Vue PACS) version 12.2.1.5 to correct some of these issues, and a new release of the product was released in May 2020. One issue requires manual intervention and affected customers are advised to contact Philips support. Users with questions regarding their specific Philips Clinical Collaboration Platform installation and new release eligibility should contact their local Philips service support team, or regional service support. Philips contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions or call 1-877-328-2808 option 4. Publication on CISA website: https://us-cert.cisa.gov/ics/advisories/icsma-20-261-01
Publication Date: September 10, 2020 Update Date: November 18, 2021 Philips is a committed leader in medical device cybersecurity. Guided by our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. Philips has become aware of potential low-to-moderate-severity vulnerabilities in affected products. These potential issues require a low skill level to exploit. To successfully exploit these vulnerabilities an attacker would need to gain either (1) physical access to surveillance stations and patient monitors or (2) access to the medical device network. These vulnerabilities, if exploited, could result in unauthorized access, interrupted monitoring, and collection of access information and/or patient data. Philips plans to release a series of updates for affected products beginning in 2020. Philips has reported the potential issues and their mitigation to customers and the appropriate government agencies, including CISA, which is issuing an advisory. Philips plans a series of new releases to remediate all reported vulnerabilities: Cybersecurity & Infrastructure Security Agency (CISA) advisory: https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
In accordance with Philips’ Coordinated Vulnerability Disclosure Policy covering the disclosure and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding certain types and versions of the Philips IntelliVue Patient Monitor system, the Patient Information Center iX (PIC iX) software, and PerformanceBridge Focal Point.
There are no known public exploits available for these issues. To date, Philips has not received any reports of exploitation of these issues or of incidents from clinical use that we have been able to associate with this issue.
Users with questions regarding their specific Philips IntelliVue monitor, PIC iX and PerformanceBridge Focal Point installations should contact their local Philips service support team, or regional service support. Philips contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions
ADDENDUM: Affected Product List
Publication Date: August 20, 2020 Update Date: August 20, 2020 Philips is a committed leader in medical device cybersecurity. As part of our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. In accordance with Philips’ Coordinated Vulnerability Disclosure Policy for the awareness and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding the Philips SureSigns VS4 patient monitoring system. Philips has become aware of low- to medium-severity vulnerabilities (CVSS scores 2.1, 4.9 and 6.3) regarding improper input validation, inadequate encryption strength, and improper access control, associated with the Philips SureSigns VS4 system, affecting versions A.07.107 and prior. There are currently no known public exploits available for the reported vulnerabilities. To date, Philips has not received any reports of exploitation of this vulnerability or of incidents from clinical use that we have been able to associate with this issue. Successful exploitation may allow an unauthorized user access to administrative controls and system configurations which could allow changes to system configuration items, causing patient data to be sent to a remote destination. This potential vulnerability does not impact patient safety. To mitigate these potential vulnerabilities, Philips recommends that customers change all system passwords on their devices with unique passwords for each device, and to physically secure the device when not in use. Customers are also advised to consider replacing the Philips SureSigns VS4 devices with a newer technology. Users with questions regarding their specific Philips SureSigns VS4 installation should contact their local Philips service support team, or regional service support. Philips contact information is available at the following location:
Cybersecurity & Infrastructure Security Agency (CISA) advisory:
Publication Date: July 30, 2020 Update Date: July 30, 2020 Philips is a committed leader in medical device cybersecurity. As part of our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. In accordance with Philips’ Coordinated Vulnerability Disclosure Policy for the awareness and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding the Philips DreamMapper software. Philips has become aware of a potential medium-severity vulnerability regarding access to log file information associated with the Philips DreamMapper software, affecting only Versions 2.24.x and prior. This potential issue requires a low skill level to exploit. To date, Philips has not received any reports of exploitation of this vulnerability or of incidents from clinical use that we have been able to associate with this issue. Successful exploitation may allow an unauthorized user attacker access to the log file information containing descriptive error messages. This potential vulnerability does not impact patient safety. The Philips DreamMapper software is a personalized therapy adherence tool for sleep apnea patients, and is not a clinical application – it does not directly provide therapy or diagnosis to patients. Philips plans a new release for DreamMapper by June 30, 2021 that remediates the security vulnerability identified. Philips has reported this potential vulnerability and its mitigation to customers and the appropriate government agencies, including CISA, which is issuing an advisory. Users with questions regarding their specific Philips DreamMapper installation should contact their local Philips service support team, or regional service support. Philips contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions
Publication Date: July 29, 2020 Update Date: August 19, 2020 Philips is aware of and currently monitoring a third-party vulnerability that impacts GRUB2 bootloader, a component that controls which operating system is booted on a system. This third-party vulnerability was recently discovered by a security vendor and is not specific to Philips or our products. The identified third-party vulnerability, designated CVE-2020-10713, also referred to as “Boot Hole,” is a buffer overflow vulnerability that exists in the way GRUB2 parses the grub.cfg configuration file. This vulnerability impacts all versions of GRUB and systems using Secure Boot with the standard Microsoft UEFI Certificate Authority. If successfully exploited, an unauthorized user could potentially bypass the Secure Boot signature verification and execute arbitrary code during the boot process. To exploit this vulnerability, a threat actor would need physical access to the system and user privileges to execute this attack.
Following analysis by Philips, the company has determined that no Philips products contain the GRUB2 bootloader component, and are therefore not affected by this third-party vulnerability.
Publication Date: July 15, 2020 Update Date: July 31, 2020 Philips is currently monitoring developments and updates related to the recent Microsoft alert concerning the reported remote code execution (RCE) vulnerability (CVE-2020-1350) in Windows DNS Server. As reported by Microsoft, a remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. Windows servers that are configured as DNS servers are at risk from this vulnerability. As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further actions or updates to potentially affected Philips products. Microsoft has released a patch to help remediate this vulnerability. Philips is currently in the process of evaluating the Microsoft patch and vendor recommended mitigation options. According to Microsoft, an attacker who successfully exploits the vulnerability could run arbitrary code in the context of the Local System Account which could allow an attacker to take control of an affected system. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Begin Update A: July 28, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1350. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status. Analytics 1.1
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Clinical Collaboration Platform (formally VuePACS) *** | IntelliSpace PACS 4.4, 4.4.55x *** | PIC iX B.0x and C.0x Physiological Server only when DNS enabled ***** |
Intellibridge Enterprise (IBE) versions B.06-.12 *,** | UDM 2.1 and 1.1 | |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter ***Philips hosting business validated and deploying the patch to the managed infrastructure ****Patch is tested and can be installed via the windows update mechanism *****Mitigation tested and applicable, see steps below: The PIC iX Physiological Server may be configured as a DNS server as outlined in the Service and Installation Guide, however the DNS Server Role is not required for PIC iX and is not installed by default. Only those installations where the Physiological Sever is configured as the DNS server would be at risk to the RCE vulnerability. The Philips Medical Device network is required to be physically isolated or logically isolated from the Hospital LAN. We suggest that network firewalls and access control lists be reviewed to ensure limited access to DNS. Philips has evaluated the Windows registry modification workaround provided by Microsoft. Philips has determined that the workaround will have no negative impact to the PIC iX system and the registry modification can be applied to the PIC iX Server configured as a DNS server. Philips strongly recommends removing the registry workaround after applying the security patch as instructed by Microsoft. For more information on the mitigation please see link below: Note: Please be aware that the "0x" prefix notation for hexadecimal value "FF00" (Decimal value 65280) represented in the Microsoft KB article should be excluded from data entry as its inclusion may have unintended results due to unpredictable handling of the "x" character. End Update A
Publication Date: June 30, 2020 Update Date: September 25, 2020 Philips is currently monitoring developments and updates related to the recent F5 alert concerning the reported remote code execution (RCE) vulnerability (CVE-2020-5902) in undisclosed pages. The technical details as reported by F5, state that this vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the configuration utility, through the BIG-IP management port and/or self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. This vulnerability may result in complete F5 system compromise. The F5 BIG-IP system in appliance mode is also vulnerable. This F5 issue is not exposed on the data plane; only the control plane is affected. As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing F5 for potential impacts from these reported vulnerabilities and validating actions. F5 has released a patch to help remediate this vulnerability. Philips is currently in the process of validating the F5 patch and vendor recommended mitigation options. Once the F5 patch has been tested and validated by Philips with the impacted products, the patch will either be installed by Philips or made available for installation by customers, depending on contract details. Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions. When a product does require security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Begin Update B: September 25, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1350. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Clinical Collaboration Platform *** (formally called Vue PACS) |
IS PACS (versions 3.6, 4.1, 4.4, 4.4.551, and 4.4.553*** |
Universal Data Manager (UDM) (versions 1.1, 2.1, and 3.1) *** |
VueBeyond |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter ***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure End Update B Begin Update A: August 28, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1350. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Clinical Collaboration Platform *** (formally called Vue PACS) |
IS PACS (versions 3.6, 4.1, 4.4, 4.4.551, and 4.4.553*** |
Universal Data Manager (UDM) (versions 1.1, 2.1, and 3.1) *** |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter ***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure End Update A
Publication Date: June 24, 2020 Update Date: June 24, 2020 Philips is a leader in medical device cybersecurity. As part of our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. In accordance with Philips’ Coordinated Vulnerability Disclosure Policy for the awareness and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding specific versions of Philips ultrasound software applications. Philips has become aware of a potential low-severity issue (CVSS v3 base score 3.6 – Low) where unauthorized personnel can bypass authentication via an alternate path or channel or via an alternate service login. This potential issue is only associated with Ultrasound ClearVue versions 3.2 and prior, Ultrasound CX versions 5.0.2 and prior, Ultrasound EPIQ and Affiniti versions VM5.0 and prior, Ultrasound Sparq version 3.0.2 and prior, and Ultrasound Xperius. To address this issue: Philips has reported this potential issue and its mitigation to customers and the appropriate government agencies, including CISA, which is issuing an advisory. https://www.usa.philips.com/healthcare/solutions/customer-service-solutions
This potential issue requires local access to an affected system and a high skill level to exploit. If a successful exploitation occurs, the only result is that an unauthorized user may be able to enable and access ultrasound device features that were not included with system purchase. Philips’ analysis indicates that this is not a device safety issue, and there is no expectation of patient hazard. To date, Philips has not received reports of this vulnerability being exploited in clinical use.
As an interim mitigation to this vulnerability, Philips recommends customers ensure service providers can guarantee installed device integrity during all service and repair operations.
Users with questions regarding their specific Philips ultrasound software installation should contact their local Philips service support team or regional service support. Philips contact information is available at:
Please see the Philips product security web site for the latest security information for Philips products: https://www.philips.com/productsecurity
Publication Date: June 18, 2020 Security researchers at JSOF have disclosed 19 different zero-day vulnerabilities within Treck TCP/IP Stack. The collection of vulnerabilities, which JSOF refers to as "Ripple20", could lead to remote code execution or exposure of sensitive information. Of the 19 flaws, 6 are rated a high severity using the industry standard calculator or common vulnerability scoring system (CVSS) v3. The exposure to these high severity issues greatly depends on the Treck products being used. Philips is currently monitoring developments and updates related to the recent published advisory (ICSA-20-168-01) concerning the reported 19 common vulnerability enumerations (CVE) as referred to as Ripple20. In the advisory, Treck recommends users apply the latest version of Treck (TCP/IP 6.0.1.67 or later). As part of the Philips product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions that may be utilizing Treck TCP/IP for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further actions or updates to potentially affected Philips products. Treck has released patches to help remediate these vulnerabilities. Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation is produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Begin Update A: September 4, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to Ripple. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Update Date: September 4, 2020
HeartStart Intrepid Monitor/Defibrillator (867172) ** (not sold in the US) |
**Information or patch available in Incenter End Update A
Publication Date: June 11, 2020 Update Date: July 1, 2020 Philips is a committed leader in medical device cybersecurity. As part of our global Product Security Policy, the company conducts extensive, ongoing analysis of our products, often in collaboration with customers and researchers, to identify and address potential vulnerabilities. In accordance with Philips’ Coordinated Vulnerability Disclosure Policy for the awareness and remediation of possible security vulnerabilities, the company is proactively issuing an advisory regarding the Philips IntelliBridge Enterprise (IBE) system. Philips has become aware of a potential low-severity vulnerability regarding unencrypted user credentials stored in transaction logs associated with the Philips IntelliBridge Enterprise (IBE) software, affecting only Versions B.12 and prior, with the following workflows: • Enterprise system integration with: • SureSigns(VS4) • EarlyVue (VS30) • IntelliVue Guardian (IGS) This potential issue requires a high skill level to exploit, and to date, Philips has not received reports of exploits of this vulnerability. Successful exploitation may allow an existing administrator and/or high privileged system user access to credentials to the hospital’s clinical information systems. The IntelliBridge Enterprise (IBE) provides HL7 interface interoperability between Philips products and hospital’s clinical information systems or electronic medical records by providing a single integration point to the enterprise. Philips IntelliBridge Enterprise has no clinical user interface, nor does it interpret, inspect, or provide additional analytical functionality for medical device data. Philips plans a new release (IBE B.13) by end of Q4 2020 that remediates the potential issue by not logging the plain text user credentials in the log file. In the interim, Philips recommends that IBE transaction logs be made only accessible with administrative privileges. If necessary, an additional, limited-privilege account can be created on the IBE system for authorized users such as service engineers. Additionally, it is recommended to reduce log retention to a shorter timeframe. Philips has reported this potential vulnerability and its mitigation to customers and the appropriate government agencies, including CISA, which is issuing an advisory. Users with questions regarding their specific Philips IntelliBridge Enterprise (IBE) installation should contact their local Philips service support team, or regional service support. Philips contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions US DHS CISA (Cybersecurity and Infrastructure Security Agency): https://www.us-cert.gov/ics/advisories/icsma-20-163-01
Publication Date: March 24, 2020 Update Date: March 24, 2020 Overview Philips produces and sells connected air purifier that provide healthy air to consumers. The connected air purifier can be controlled by an app, Philips has partnered with Air Matters, a world-leading air quality app. It monitors in- and outdoor air quality, offers insights, controls your Philips connected Air device, shows its filter status, and gives you advice how to manage exposure to air pollution and allergens. An independent security researcher submitted three vulnerabilities that can be mitigated regarding communications, key length and de-compilation of the mobile app. Affected Products: Philips reports that these vulnerabilities affect Air Matters Android version 4.2.9 and below. Impact: An attacker connected to an unprotected WiFi local network could compromise the encryption protocol to start and/or stop the air purifier. An attacker connected to the WiFi local network can connect to the device. Subsequently the device can remotely be controlled. This impact is similar to downloading the Airmatters App and in a local network connect to the Airpurifier device. Which is standard behavior part of the functionality advertised to the customer. Background An independent security researcher reported the local network communication between the app and the Air Purifier has been reverse engineered. The three main vulnerabilities identified are 1) No use of https/tls encryption in the local network. 2) Diffie Hellman key length, and 3) de-compilation of Android mobile app. 4) through scripting from the local network a connection with the device can be setup. These vulnerabilities do not impact confidentiality or integrity of data. The vulnerabilities could potentially impact availability. Once notified, Philips analyzed the extent and started the containment and resolution actions. The vulnerabilities are due to the use of a outdate chip version. This chip is not used in the production of new devices anymore. Newer versions of the device use a chip without these vulnerabilities. CWE-319: Cleartext Transmission of Information The software transmits data in cleartext in a communications channel that can be sniffed by unauthorized actors. Many communication channels can be sniffed by attackers during data transmission. CVSS v3 base scores for this vulnerability is rated as 5.3 (Medium) with the vector string of: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CWE-327: INSUFFICIENT DIFFIE HELLMAN STRENGTH The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of information. CVSS v3 base scores for this vulnerability is rated as 4.3 (Medium) with the vector string of: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Through Scripting in the local network a connection with the device can be setup. Subsequently this connection can be used to control the device remote. Existence of Exploit Public exploits exist for some of these vulnerabilities, however, none are specifically targeted for Philips Air Purifier. Difficulty An attacker with medium to high skill in would be able to exploit these vulnerabilities Mitigation For the old infrastructure of Philips Air Purifiers products: The improved infrastructure of new launched Air Purifiers will not have these issues anymore as they have been solved. The new products have been introduced from mid 2019 onwards. Philips recommends consumers to use the new devices with the new infrastructure. Please see the Philips product security web site for the latest security information for Philips products: https://www.philips.com/productsecurity
Vulnerability Overview
Publication Date: March 12, 2020 Royal Philips (NYSE: PHG, AEX: PHIA), a global leader in health technology, today announced that the company was named the first medical device manufacturer to receive a new Underwriters Laboratories (UL) product cybersecurity testing certification. Underwriters Laboratories (UL) is an independent global safety certification and testing company with locations worldwide. The UL IEC 62304 certification was designed by Underwriters Laboratories to provide an overall framework to evaluate the robustness and maturity of a medical device manufacturer’s cybersecurity controls and capabilities for product development. In support of the successful Philips firm registration for the security option of IEC 62304, UL performed a comprehensive audit of the Philips Security Center of Excellence. The Center was launched in 2015 to develop cyber-resilient products and services through security-by-design, risk assessment, vulnerability and penetration assessment, specialized trainings, and incident response. The audit reviewed and verified core Philips Security Center of Excellence product security processes, including security risk management and risk control measures, software security verification planning, change management and continuous improvement, and the Center’s laboratory quality management system. The UL certification combines cybersecurity testing elements of the established UL 2900-2-1 standard for Software Cybersecurity for Network-Connectable Products, which focuses on the demanding requirements of healthcare and wellness systems, as well as security principles from international standards (ISO 13485 and ISO 14971). The detailed press release can be found: http://www.newscenter.philips.com/us_en
Update Date: Feb March 12, 2020
Publication Date: February 20, 2020 Update Date: April 20, 2020 Philips is currently monitoring developments and updates related to the recent Bluetooth Low Energy (BLE) alert concerning the reported SweynTooth, a family of 12 vulnerabilities (CVE-2019-16336, CVE-2019-17519, CVE-2019-17517, CVE-2019-17518, CVE-2019-17520, CVE-2019-19195, CVE-2019-19196, CVE-2019-17061, CVE-2019-17060, CVE-2019-19192, CVE-2019-19193, CVE-2019-19194 ). As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Bluetooth Low Energy (BLE) for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for updates related to these vulnerabilities and evaluating further actions or updates to potentially affected Philips products. According to Texas Instruments, NXP, Cypress, Dialog Semiconductors, Microchip, STMicroelectronics and Telink Seminconductor, successful exploitation of these vulnerabilities allows an attacker in radio range to trigger deadlocks, crashes, and buffer overflows or completely bypass security depending on the circumstances. Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation is produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products. Begin Update A: April 20, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to SweynTooth. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Diamond Clean Smart connected power toothbrush (codes start with HX99) | Flexcare Platinum Connected power toothbrush (codes start with HX91) | Saeco Gran Baristo Avanti – Espresso Machine Models |
Diamond Clean 9000 connected power toothbrush (codes start with HX99) | Philips Connected Shaver 7000 (S77xx & S79xx) | |
Expert Clean power connected toothbrush (HX96) | Sonicare - Kids connected power toothbrush (codes start with HX63) | |
End Update A
Publication Date: January 16, 2020 Philips is currently monitoring developments and updates related to the recent Microsoft alert concerning the reported Curve Ball or NSA Crypt or CryptoAPI spoofing vulnerability (CVE-2020-0601). As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further actions or updates to potentially affected Philips products. Microsoft has released patches to help remediate these vulnerabilities. Philips is currently in the process of evaluating these patches. According to Microsoft, successful exploitation of this vulnerability allows Elliptic Curve Cryptography (ECC) certificate validation to bypass the trust store, enabling unwanted or malicious software to masquerade as authentically signed by a trusted or trustworthy organization. This could deceive users or thwart malware detection methods such as antivirus. Additionally, a maliciously crafted certificate could be issued for a hostname that did not authorize it, and a browser that relies on Windows CryptoAPI would not issue a warning, allowing an attacker to decrypt, modify, or inject data on user connections without detection. If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation is produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams. Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.
Update Date: June 4, 2024
Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.
Achieva (Upgrade R1, R2, R3 to R5), R5, 3.0T, 3.0T (TX), and XR) | Forcare Suite* | IntelliSpace Portal Workstation* |
CareEvent* | Holter Recorder DigiTrak XT (CTXT)* | IntelliVue Guardian Software |
CompuRecord G.01* | Illumeo 2.0* | Xper IM* |
Diagnostics Site Server (DSS) | Ingenia (Upgrade to R5 & Factory R5) | MobileDiagnost wDR |
DigitalDiagnost C90 | Intellibridge Enterprise (IBE)* | Multiva/Prodiva |
DoseWise Portal | IntelliSpace Cardiovascular (ISCV)* | PIC iX* |
EchoNavigator | IntelliSpace Console Critical Care (ISCCC) | ST80i A.02 |
eICU eCare Manager | IntelliSphere Critical Care and Anesthesia (ICCA)*,** | VSS Dashboard* |
FocalPoint A.0/A.01* | IntelliSpace ECG Management System B.00 (IECG) | |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter
Publication Date: January 15, 2020 Update Date: June 1, 2023 Microsoft has released patches to help remediate these vulnerabilities. According to Microsoft, successful exploitation of this vulnerability could allow an unauthorized user to execute arbitrary code on the target system. An unauthorized user could then install programs; view, change, or delete data; or create new accounts with full user rights. Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions. Begin Update C:
Philips is currently monitoring developments and updates related to the recent Microsoft alert concerning the reported Windows RD Gateway and Windows Remote Desktop Client vulnerabilities (CVE-2020-0609, CVE-2020-0610, and CVE-2020-0611).
As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further actions or updates to potentially affected Philips products.
If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation is produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams.
Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.
Philips is providing the list below to better assist our customers in identifying any Philips’ products that could be impacted by these vulnerabilities. To the best of our knowledge, the list is complete, and products & solutions not listed should be considered not impacted. Philips reserves the right to update the list as necessary if additional products are identified.
Achieva (R1, R2, R3 to R5, R5, 3.0T, 3.0TX, and XR) | Holter Recorder DigiTrak XT (DTXT)* | PIIC Classic |
Allura (Centron, Clarity, Xper) | Illumeo 2.0 | Prograde |
Azurion | Ingenia (upgrade to R5 & Factory R5) | ProxiDiagnost N90 |
CareEvent* | Intelibridge Enterprise (IBE)* | SPhAERA (3.x & 4.x) |
ClearVue | IntelliSpace Breast | ST80i A.02* |
CombiDiagnost R90 | IntelliSpace Cardiovascular (ISCV)* | SyncVision |
CompuRecord (F.02, G.00, G.01)* | IntelliSpace Console Critical Care (ISCCC) | UDM |
Core M2 | IntelliSpace Discovery 2.0 | ViewForum |
Coronary Tools | IntelliSpace ECG Management System B.00 (IECG)* | VSS Dashboard* |
Diagnostics Site Server (DSS) | IntelliSpace Perinatal (ISP)* | Xcelera 4.1* |
DigitalDiagnost (C50, C90, Opta C50) | Multiva | XIRIS 8.3 |
FlexCardio | Multiva/Prodiva | Xper IM* |
FocalPoint A.0/A.01 | PIC iX* | XtraVision |
DoseWise Portal* | IntelliSpace Portal (Server & Workstation) | |
DR Compact | IntelliVue Guardian Software* | |
DuraDiagnost (Compact and F30) | ISP Anywhere | |
EasyDiagnost | ISP VL Caputre 1.1 Visible Light | |
EchoNavigator | Juno DRF (5.7) | |
eICU Care Manager | MicroDose (S0 (Balder), S1 (L50), S1 U (L50 U)) | |
EP Navigator | MobileDiagnost (M50, Opta, and wDR) | |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter End Update C Begin Update B: February 4, 2020 Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-0609, CVE-2020-0610, and CVE-2020-0611. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
Achieva (R1, R2, R3 to R5, R5, 3.0T, 3.0TX, and XR) | Epiq | Multiva |
Affiniti | FlexCardio | Multiva/Prodiva |
Allura (Centron, Clarity, Xper) | FocalPoint A.0/A.01 | PIC iX* |
Azurion | Holter Recorder DigiTrak XT (DTXT)* | PIIC Classic |
CareEvent* | Illumeo 2.0 | Prograde |
ClearVue | Ingenia (upgrade to R5 & Factory R5) | ProxiDiagnost N90 |
CombiDiagnost R90 | Intelibridge Enterprise (IBE)* | Sparq |
CompuRecord (F.02, G.00, G.01)* | IntelliSpace Breast | SPhAERA (3.0 to 3.5, 3.6 & greater) |
Core M2 | IntelliSpace Cardiovascular (ISCV)* | ST80i A.02* |
Coronary Tools | IntelliSpace Console Critical Care (ISCCC) | SyncVision |
CX50/30 | IntelliSpace Discovery 2.0 | UDM |
Diagnostics Site Server (DSS) | IntelliSpace ECG Management System B.00 (IECG)* | ViewForum |
DigitalDiagnost (C50, C90, Opta C50) | IntelliSpace Perinatal (ISP)* | Volcano Core Imaging System |
DoseWise Portal* | IntelliSpace Portal (Server & Workstation) | Volcano Core Mobile Imaging System |
DR Compact | IntelliVue Guardian Software* | VSS Dashboard* |
DuraDiagnost (Compact and F30) | ISP Anywhere | Xcelera 4.1* |
EasyDiagnost | ISP VL Caputre 1.1 Visible Light | XIRIS 8.3 |
EchoNavigator | Juno DRF (5.7) | Xper IM* |
eICU Care Manager | MicroDose (S0 (Balder), S1 (L50), S1 U (L50 U)) | XtraVision |
EP Navigator | MobileDiagnost (M50, Opta, and wDR) | |
*Software only products with customer owned Operating Systems **Information or patch available in Incenter Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-0609, CVE-2020-0610, and CVE-2020-0611. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.
End Update B
Begin Update A: January 21, 2020
Access CT (6 & 16 Slice) | Achieva (R1, R2, R3 to R5, R5, 3.0T, 3.0TX, and XR) | Brilliance (Big Bore Radiology, CT 64, CT Big Bore, iCT, iCT SP) |
CombiDiagnost R90 | Corsium | CT MX16 EV02 |
Diagnostics Site Server (DSS) | DigitalDiagnost (C50, C90, Opta C50) | DR Compact |
DuraDiagnost (Compact and F30) | EasyDiagnost | Holter Recorder DigiTrak XT (DTXT) |
Ingenia (upgrade to R5 & Factory R5) | Ingenuity (Core, Core 128, Core128/Elite China, CT, CT Brazil, TF PET/CT, TF PET/CT RoHS systems) | IntelliSpace Breast |
IntelliSpace Connect Release 1.0 | IntelliSpace ECG Management System B.00 (IECG) | IQon Spectral CT |
Juno DRF | MicroDose (S0 (Balder), S1 (L50), S1 U (L50 U)) | MobileDiagnost (M50, Opta and wDR) |
Multiva | Multiva/Prodiva | Prograde |
ProxiDiagnost N90 | SPhAERA (3.x & 4.x) | ST80i A.02 |
Vereos | | |
**Information or patch available in Incenter
End Update A
Publication Date: January 14, 2020 Update Date: January 14, 2020 Philips is aware that Microsoft is ending Extended Support for the Windows 7 and Windows Server 2008 R2 operating systems on January 14, 2020. As part of Philips product lifecycle management processes, product security policy, and associated protocols, and in anticipation of the expiration of Microsoft’s Extended Support period for Windows 7 and Windows Server 2008 R2, Philips has been evaluating Philips products and solutions that utilize these operating systems. Philips is currently working to provide information regarding expiration of Microsoft extended support for Windows 7 and Windows Server 2008 as related to Philips products and solutions together with guidance to attain any further required product-specific information in support of any Philips products or solutions that use these Microsoft operating systems. Philips products and solutions must be deployed and operated within Philips-approved product specifications as noted in their Instructions for Use. Also, as required by government regulations in the markets we operate in, all changes of configuration or software to Philips’ products or solutions (including operating system security updates and patches) may be implemented only by following Philips product-specific, verified and validated, authorized, and communicated customer procedures or field actions. Contract-entitled customers and service representatives may access product-specific service documentation produced by Philips is providing the list below in order to assist our customers in identifying Philips’ products and solutions running on Microsoft Windows 7 or Windows Server 2008 R2. However, the list below is not exhaustive for all affected Philips products, and it includes:
Philips product teams and made available to Philips product service support and/or service delivery platforms
such as Philips InCenter (https://incenter.medical.philips.com). Entitled customers are encouraged to request Philips InCenter access and reference product-specific information when posted. Customers are also encouraged to contact their local service support team or regional product service support for information specific to their Philips’ products or environments.
Access CT 6/16 – 2.x | Brilliance Big Bore / 4.2 | Brilliance iCT/4.x, iCT SP/4.x, 64/4.x |
CareEvent * | CompuRecord * | Core Imaging S5 3.5, M2 4.2, |
Diagnostic Site Server (DSS) | DynaCAD Breast and Prostate | DynaSuite Neuro 3 |
eCareManager * | eICU * | G3 Alice6 * |
HCIS RIS 2010 10.x Clients | HCIS Vue PACS 11.3, Vue PACS 11.4 * | HCIS Vue RIS 11.0.12.x, |
HeartStart Configure 3.1 * | HeartStart Data Messenger 4.3.1 * | HeartStart Event Review |
HeartStart Event Review Pro 5.0 * | IBE * | IEM v11.0x * |
Incisive CT/1.0 | Ingenuity CT / 4.x, Core, Core 128 | Ingenuity TF/4.0.x |
IntelliSpace Critical Care and Anesthesia (ICCA) * | IntelliSpace ECG Management System B.00 (IECG) * | IntelliSpace ECG Management System B.00 (IECG) * |
IntelliSpace PACS 4.4 | IntelliSpace Perinatal * | IntelliVue Guardian Software * |
ISCV 1.x, 2.x, 3.x, 4.x * | ISP Anywhere 1.3 | ISP6/7/8 |
Mobile 3.5 | MX 16/2.x | Oncad |
PIIC iX, PIIC Classic * | Respironics Actiware * | SensaVue HD and fMRI |
Sleepware G3 * | SPhAERA (3.0 to 3.5) **** | ST80i A.02 * |
Syncvision 4.2 | Tempus ReachBak i2i * | UDM 1.1, 2.1 |
Vereos/2.0.x | Viewforum for Fixed Systems V6.3V1L9 | Viewforum for Mobile Systems V6.3V1L7, V6.3V1L8 |
Vue RIS 11.0.14.x | Xcelera 4.1 * | XIRIS 8.3 |
Xper Flex Cardio | Xper IM 1.5, 2.x * | |
Information available from Philips InCenter, local service support, or regional product service support. * Software only products with customer owned Operating Systems **** End of Life (EoL) If customers still have questions, all customers are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products or solutions.
Philips manufactures, sells and helps you maintain highly complex medical devices and systems. Per policy, only Philips authorized changes are allowed to be made to these systems, either by Philips personnel or under Philips explicit published direction.
Please contact your Philips service representative for specific information about potential vulnerabilities and the availability of patches for your equipment configuration.
You are about to visit a Philips global content page
Continue