ID

VAR-202009-0600


CVE

CVE-2020-16247


TITLE

Philips Made Clinical Collaboration Platform Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2020-008764

DESCRIPTION

Philips Clinical Collaboration Platform, Versions 12.2.1 and prior, exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. Clinical Collaboration Platform Is Philips This is a medical image information system provided by the company. Clinical Collaboration Platform Is vulnerable to several vulnerabilities: * Cross-site request forgery (CWE-352) - CVE-2020-14506 *Web Improperly invalidating scripts in page tag attributes (CWE-83) - CVE-2020-14525 * Malfunction of protection mechanism (CWE-693) - CVE-2020-16198 * Algorithm downgrade (CWE-757) - CVE-2020-16200 * Environmental setting (CWE-16) - CVE-2020-16247The expected impact depends on each vulnerability, but it may be affected as follows. * When a user who logs in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2020-14506 * Arbitrary script is executed by the user who logged in to the product - CVE-2020-14525 * Authentication is bypassed and unauthorized access is made by an adjacent third party - CVE-2020-16198 * Adjacent third parties cause resource exhaustion and disrupt service operations (DoS) Be in a state - CVE-2020-16200 * Unauthorized access to sensitive information by a third party - CVE-2020-16247. Attackers can use this vulnerability to gain unauthorized access to resources

Trust: 2.25

sources: NVD: CVE-2020-16247 // JVNDB: JVNDB-2020-008764 // CNVD: CNVD-2020-52879 // VULHUB: VHN-169306

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-52879

AFFECTED PRODUCTS

vendor:philipsmodel:clinical collaboration platformscope:lteversion:12.2.1

Trust: 1.0

vendor:philipsmodel:clinical collaboration platformscope:eqversion:12.2.1

Trust: 0.8

vendor:philipsmodel:clinical collaboration platformscope:lteversion:<=12.2.1

Trust: 0.6

sources: CNVD: CNVD-2020-52879 // JVNDB: JVNDB-2020-008764 // NVD: CVE-2020-16247

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2020-008764
value: MEDIUM

Trust: 2.4

IPA: JVNDB-2020-008764
value: LOW

Trust: 1.6

nvd@nist.gov: CVE-2020-16247
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-16247
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2020-52879
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202009-1043
value: HIGH

Trust: 0.6

VULHUB: VHN-169306
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-16247
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2020-52879
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-169306
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-16247
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-16247
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 2.5
impactScore: 4.2
version: 3.1

Trust: 1.0

IPA score: JVNDB-2020-008764
baseSeverity: LOW
baseScore: 3.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: LOW
baseScore: 3.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 5.0
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-008764
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-52879 // VULHUB: VHN-169306 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // JVNDB: JVNDB-2020-008764 // CNNVD: CNNVD-202009-1043 // NVD: CVE-2020-16247 // NVD: CVE-2020-16247

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.1

problemtype:CWE-668

Trust: 1.1

sources: VULHUB: VHN-169306 // NVD: CVE-2020-16247

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202009-1043

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-202009-1043

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008764

PATCH

title:Product Security url:https://www.usa.philips.com/healthcare/about/customer-support/product-security

Trust: 0.8

title:Patch for Philips Clinical Collaboration Platform improper access control vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/234883

Trust: 0.6

title:Philips Clinical Collaboration Platform Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=129243

Trust: 0.6

sources: CNVD: CNVD-2020-52879 // JVNDB: JVNDB-2020-008764 // CNNVD: CNNVD-202009-1043

EXTERNAL IDS

db:NVDid:CVE-2020-16247

Trust: 3.1

db:ICS CERTid:ICSMA-20-261-01

Trust: 3.1

db:JVNid:JVNVU94803567

Trust: 0.8

db:JVNDBid:JVNDB-2020-008764

Trust: 0.8

db:CNVDid:CNVD-2020-52879

Trust: 0.7

db:AUSCERTid:ESB-2020.3220

Trust: 0.6

db:CNNVDid:CNNVD-202009-1043

Trust: 0.6

db:VULHUBid:VHN-169306

Trust: 0.1

sources: CNVD: CNVD-2020-52879 // VULHUB: VHN-169306 // JVNDB: JVNDB-2020-008764 // CNNVD: CNNVD-202009-1043 // NVD: CVE-2020-16247

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsma-20-261-01

Trust: 3.7

url:https://www.philips.com/a-w/security/security-advisories/product-security-2020.html#2020_archive

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16200

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16247

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14506

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14525

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16198

Trust: 0.8

url:https://jvn.jp/vu/jvnvu94803567

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-16247

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3220/

Trust: 0.6

sources: CNVD: CNVD-2020-52879 // VULHUB: VHN-169306 // JVNDB: JVNDB-2020-008764 // CNNVD: CNNVD-202009-1043 // NVD: CVE-2020-16247

SOURCES

db:CNVDid:CNVD-2020-52879
db:VULHUBid:VHN-169306
db:JVNDBid:JVNDB-2020-008764
db:CNNVDid:CNNVD-202009-1043
db:NVDid:CVE-2020-16247

LAST UPDATE DATE

2025-06-05T23:07:39.604000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-52879date:2020-09-19T00:00:00
db:VULHUBid:VHN-169306date:2022-04-25T00:00:00
db:JVNDBid:JVNDB-2020-008764date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202009-1043date:2022-04-26T00:00:00
db:NVDid:CVE-2020-16247date:2025-06-04T22:15:24.350

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-52879date:2020-09-19T00:00:00
db:VULHUBid:VHN-169306date:2020-09-18T00:00:00
db:JVNDBid:JVNDB-2020-008764date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202009-1043date:2020-09-17T00:00:00
db:NVDid:CVE-2020-16247date:2020-09-18T18:15:17.113