ID

VAR-202009-0589


CVE

CVE-2020-16200


TITLE

Philips Made Clinical Collaboration Platform Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2020-008764

DESCRIPTION

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior, does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Clinical Collaboration Platform Is Philips This is a medical image information system provided by the company. Clinical Collaboration Platform Is vulnerable to several vulnerabilities: * Cross-site request forgery (CWE-352) - CVE-2020-14506 *Web Improperly invalidating scripts in page tag attributes (CWE-83) - CVE-2020-14525 * Malfunction of protection mechanism (CWE-693) - CVE-2020-16198 * Algorithm downgrade (CWE-757) - CVE-2020-16200 * Environmental setting (CWE-16) - CVE-2020-16247The expected impact depends on each vulnerability, but it may be affected as follows. * When a user who logs in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2020-14506 * Arbitrary script is executed by the user who logged in to the product - CVE-2020-14525 * Authentication is bypassed and unauthorized access is made by an adjacent third party - CVE-2020-16198 * Adjacent third parties cause resource exhaustion and disrupt service operations (DoS) Be in a state - CVE-2020-16200 * Unauthorized access to sensitive information by a third party - CVE-2020-16247. Attackers can use this vulnerability to exhaust available resources

Trust: 2.25

sources: NVD: CVE-2020-16200 // JVNDB: JVNDB-2020-008764 // CNVD: CNVD-2020-52880 // VULHUB: VHN-169255

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-52880

AFFECTED PRODUCTS

vendor:philipsmodel:clinical collaboration platformscope:lteversion:12.2.1

Trust: 1.0

vendor:philipsmodel:clinical collaboration platformscope:eqversion:12.2.1

Trust: 0.8

vendor:philipsmodel:clinical collaboration platformscope:lteversion:<=12.2.1

Trust: 0.6

sources: CNVD: CNVD-2020-52880 // JVNDB: JVNDB-2020-008764 // NVD: CVE-2020-16200

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2020-008764
value: MEDIUM

Trust: 2.4

IPA: JVNDB-2020-008764
value: LOW

Trust: 1.6

nvd@nist.gov: CVE-2020-16200
value: MEDIUM

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-16200
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2020-52880
value: MEDIUM

Trust: 0.6

VULHUB: VHN-169255
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-16200
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2020-52880
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-169255
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-16200
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

IPA score: JVNDB-2020-008764
baseSeverity: LOW
baseScore: 3.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: LOW
baseScore: 3.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 5.0
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-52880 // VULHUB: VHN-169255 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // NVD: CVE-2020-16200 // NVD: CVE-2020-16200

PROBLEMTYPE DATA

problemtype:CWE-757

Trust: 1.1

sources: VULHUB: VHN-169255 // NVD: CVE-2020-16200

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008764

PATCH

title:Product Security url:https://www.usa.philips.com/healthcare/about/customer-support/product-security

Trust: 0.8

title:Patch for Philips Clinical Collaboration Platform algorithm downgrade vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/234886

Trust: 0.6

sources: CNVD: CNVD-2020-52880 // JVNDB: JVNDB-2020-008764

EXTERNAL IDS

db:ICS CERTid:ICSMA-20-261-01

Trust: 2.5

db:NVDid:CVE-2020-16200

Trust: 2.5

db:JVNid:JVNVU94803567

Trust: 0.8

db:JVNDBid:JVNDB-2020-008764

Trust: 0.8

db:CNVDid:CNVD-2020-52880

Trust: 0.7

db:VULHUBid:VHN-169255

Trust: 0.1

sources: CNVD: CNVD-2020-52880 // VULHUB: VHN-169255 // JVNDB: JVNDB-2020-008764 // NVD: CVE-2020-16200

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsma-20-261-01

Trust: 2.5

url:https://www.philips.com/a-w/security/security-advisories/product-security-2020.html#2020_archive

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16200

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16247

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14506

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14525

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16198

Trust: 0.8

url:https://jvn.jp/vu/jvnvu94803567

Trust: 0.8

sources: CNVD: CNVD-2020-52880 // VULHUB: VHN-169255 // JVNDB: JVNDB-2020-008764 // NVD: CVE-2020-16200

SOURCES

db:CNVDid:CNVD-2020-52880
db:VULHUBid:VHN-169255
db:JVNDBid:JVNDB-2020-008764
db:NVDid:CVE-2020-16200

LAST UPDATE DATE

2025-06-05T23:07:39.495000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-52880date:2020-09-19T00:00:00
db:VULHUBid:VHN-169255date:2020-09-25T00:00:00
db:JVNDBid:JVNDB-2020-008764date:2020-09-24T00:00:00
db:NVDid:CVE-2020-16200date:2025-06-04T22:15:23.680

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-52880date:2020-09-19T00:00:00
db:VULHUBid:VHN-169255date:2020-09-18T00:00:00
db:JVNDBid:JVNDB-2020-008764date:2020-09-24T00:00:00
db:NVDid:CVE-2020-16200date:2020-09-18T18:15:17.037