VARIoT IoT vulnerabilities database
| VAR-202009-1714 | No CVE | A weak password vulnerability exists in the Internet of Things management platform for Jiangsu Luchi cleaning equipment |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Weak passwords refer to passwords that only contain simple numbers and letters, such as "123", "abc", etc., because such passwords can be easily cracked by others, so that the user's Internet account is controlled by others, so it is not recommended for users to use.
url: https://117.48.157.45/
Weak password account: admin Weak password password: 123456
| VAR-202009-0214 | CVE-2020-12788 | Microchip Atmel ATSAMA5 Vulnerability related to information leakage due to different response to security-related processing in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks. Microchip Atmel ATSAMA5 The product contains a vulnerability related to information leakage due to the difference in response to security-related processing.Information may be obtained
| VAR-202009-0092 | CVE-2020-12789 | Microchip Atmel ATSAMA5 Product vulnerabilities to the use of hard-coded credentials |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets. Microchip Atmel ATSAMA5 The product contains a vulnerability in the use of hard-coded credentials.Information may be obtained
| VAR-202009-0213 | CVE-2020-12787 | Microchip Atmel ATSAMA5 Product vulnerabilities |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling. Microchip Atmel ATSAMA5 The product contains unspecified vulnerabilities.Information may be tampered with
| VAR-202009-1214 | CVE-2018-20432 | D-Link COVR-2600R and COVR-3902 Kit Vulnerability in Using Hard Coded Credentials |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration. D-Link COVR-2600R and COVR-3902 Kit Is vulnerable to the use of hard-coded credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202009-0180 | CVE-2020-11881 | MikroTik RouterOS Array index validation vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964. MikroTik RouterOS Is vulnerable to array index validation.Denial of service (DoS) It may be put into a state. MikroTik RouterOS is a Linux-based router operating system developed by Latvian MikroTik Company. The system can be deployed in a PC so that it provides router functionality. Attackers can use this vulnerability to modify the setup-request package (ie su -12964) to destroy the SMB server
| VAR-202009-1704 | No CVE | XSS vulnerability exists in IF cloud technology website construction display system |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
Fuzhou Yihuyun Technology Co., Ltd. was established on December 17, 2018. The company's business scope includes: application software development; cloud software services; information technology consulting services; technology development, technology transfer, technology consulting, and technical services in the field of digital publishing; other information system integration services; online business consulting; business management consulting services; Design, production, agency, and release of various domestic advertisements; office equipment rental services; Internet of Things technical services; artificial intelligence public data platform; network and information security software development; advertising consulting services, etc.
The IF Cloud Technology website construction demonstration system has an XSS vulnerability, which can be exploited by an attacker to obtain user cookie information.
| VAR-202009-1670 | No CVE | Feiyuxing home smart router has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chengdu Feiyuxing Technology Co., Ltd. was established in 2002 and went public in 2014 (stock code: 831002). It is headquartered in Chengdu Tianfu Software Park. It is a leading brand of intelligent network solutions in China and one of the few companies in the industry with independent intellectual property rights and One of the local companies with independent research and development capabilities.
Feiyuxing home smart router has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202009-1318 | CVE-2020-9239 | Huawei Toronto-TL10 Information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Huawei smartphones BLA-A09 versions 8.0.0.123(C212),versions earlier than 8.0.0.123(C567),versions earlier than 8.0.0.123(C797);BLA-TL00B versions earlier than 8.1.0.326(C01);Berkeley-L09 versions earlier than 8.0.0.163(C10),versions earlier than 8.0.0.163(C432),Versions earlier than 8.0.0.163(C636),Versions earlier than 8.0.0.172(C10);Duke-L09 versions Duke-L09C10B187, versions Duke-L09C432B189, versions Duke-L09C636B189;HUAWEI P20 versions earlier than 8.0.1.16(C00);HUAWEI P20 Pro versions earlier than 8.1.0.152(C00);Jimmy-AL00A versions earlier than Jimmy-AL00AC00B172;LON-L29D versions LON-L29DC721B192;NEO-AL00D versions earlier than 8.1.0.172(C786);Stanford-AL00 versions Stanford-AL00C00B123;Toronto-AL00 versions earlier than Toronto-AL00AC00B225;Toronto-AL00A versions earlier than Toronto-AL00AC00B225;Toronto-TL10 versions earlier than Toronto-TL10C01B225 have an information vulnerability. A module has a design error that is lack of control of input. Attackers can exploit this vulnerab
| VAR-202009-0115 | CVE-2020-14100 | Xiaomi router input validation error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypassed, causing remote code execution. The router administrator can gain root access from this vulnerability. Xiaomi router is a wireless router of China's Xiaomi Technology (Xiaomi) company.
Xiaomi router R3600 ROM versions prior to 1.0.66 have an input verification error vulnerability
| VAR-202009-0114 | CVE-2020-14096 | Xiaomi AI speaker Rom buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Memory overflow in Xiaomi AI speaker Rom version <1.59.6 can happen when the speaker verifying a malicious firmware during OTA process. Xiaomi AI speaker Rom is a smart speaker device from the Chinese company Xiaomi
| VAR-202009-1671 | No CVE | Unauthorized access vulnerability exists in FX equipment of Shenzhen Xingfuxing Technology Co., Ltd. |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Shenzhen Xing Fusion Technology Co., Ltd. was established in July 2018. The company's business scope includes: information technology, computer hardware and software and peripheral equipment, network systems, communication engineering, automotive technology, biological engineering and biological products.
An unauthorized access vulnerability exists in the FX device of Shenzhen Xingfuxing Technology Co., Ltd., which can be exploited by attackers to obtain sensitive information.
| VAR-202009-1673 | No CVE | Shenzhen Wangxin Technology Co., Ltd. Wangxin Cloud device has unauthorized access vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Shenzhen Wangxin Technology Co., Ltd. is committed to the field of global shared computing and blockchain, and amplifies the power of everyone through technological innovation.
Shenzhen Netheart Technology Co., Ltd. Netheart Cloud equipment has an unauthorized access vulnerability. Attackers can use this vulnerability to gain unauthorized access to the system to obtain the device SN code/set the device access method/basic information/LAN port information/extract logs/run the device Restart/reset the device, etc.
| VAR-202009-1674 | No CVE | Shanghai Golden Bridge Information Co., Ltd. Crestron indoor media controller has unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shanghai Golden Bridge Information Co., Ltd. was established in August 1994. The company's business scope includes: information systems, safety and fire prevention engineering, computer information system integration, computer software and hardware product development, etc.
Shanghai Golden Bridge Information Co., Ltd. Crestron's indoor media controller has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202009-1589 | CVE-2020-16230 | HMS Networks Made Ewon Flexy and Ewon Cosy Cross-domain vulnerabilities |
CVSS V2: 2.1 CVSS V3: 2.3 Severity: LOW |
All version of Ewon Flexy and Cosy prior to 14.1 use wildcards such as (*) under which domains can request resources. An attacker with local access and high privileges could inject scripts into the Cross-origin Resource Sharing (CORS) configuration that could abuse this vulnerability, allowing the attacker to retrieve limited confidential information through sniffing. HMS Networks Provided by the company Ewon Flexy and Ewon Cosy Is an industrial gateway product. The product is cross-domain using an unauthorized domain (CWE-942) Vulnerability exists. The product is a wild card (*) Can be used to request domain resources, so by a highly privileged local third party CORS (Cross-Origin Resource Sharing) Sensitive information can be stolen by inserting a specially crafted script into the configuration file of.Sensitive information can be stolen by a highly authorized local third party
| VAR-202009-0277 | CVE-2020-13920 | Apache ActiveMQ Authentication vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. Apache ActiveMQ Contains an authentication vulnerability.Information may be obtained. Apache ActiveMQ is a set of open source message middleware of the Apache Software Foundation in the United States. It supports Java message services, clusters, Spring Framework, etc. effect is a software package for adding image effects. A security vulnerability exists in Apache ActiveMQ 5.15.12. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Fuse 7.9.0 release and security update
Advisory ID: RHSA-2021:3140-01
Product: Red Hat JBoss Fuse
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3140
Issue date: 2021-08-11
CVE Names: CVE-2017-5645 CVE-2017-18640 CVE-2019-12402
CVE-2019-14887 CVE-2019-16869 CVE-2019-20445
CVE-2020-1695 CVE-2020-1925 CVE-2020-1935
CVE-2020-1938 CVE-2020-5410 CVE-2020-5421
CVE-2020-6950 CVE-2020-9484 CVE-2020-10688
CVE-2020-10693 CVE-2020-10714 CVE-2020-10719
CVE-2020-11996 CVE-2020-13920 CVE-2020-13934
CVE-2020-13935 CVE-2020-13936 CVE-2020-13954
CVE-2020-13956 CVE-2020-14040 CVE-2020-14297
CVE-2020-14338 CVE-2020-14340 CVE-2020-17510
CVE-2020-17518 CVE-2020-25633 CVE-2020-25638
CVE-2020-25640 CVE-2020-25644 CVE-2020-26258
CVE-2020-26945 CVE-2020-27216 CVE-2020-28052
CVE-2021-27807 CVE-2021-27906 CVE-2021-28165
=====================================================================
1. Summary:
A minor version update (from 7.8 to 7.9) is now available for Red Hat Fuse.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
This release of Red Hat Fuse 7.9.0 serves as a replacement for Red Hat Fuse
7.8, and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.
Security Fix(es):
* hawtio-osgi (CVE-2017-5645)
* prometheus-jmx-exporter: snakeyaml (CVE-2017-18640)
* apache-commons-compress (CVE-2019-12402)
* karaf-transaction-manager-narayana: netty (CVE-2019-16869,
CVE-2019-20445)
* tomcat (CVE-2020-1935, CVE-2020-1938, CVE-2020-9484, CVE-2020-13934,
CVE-2020-13935, CVE-2020-11996)
* spring-cloud-config-server (CVE-2020-5410)
* velocity (CVE-2020-13936)
* httpclient: apache-httpclient (CVE-2020-13956)
* shiro-core: shiro (CVE-2020-17510)
* hibernate-core (CVE-2020-25638)
* wildfly-openssl (CVE-2020-25644)
* jetty (CVE-2020-27216, CVE-2021-28165)
* bouncycastle (CVE-2020-28052)
* wildfly (CVE-2019-14887, CVE-2020-25640)
* resteasy-jaxrs: resteasy (CVE-2020-1695)
* camel-olingo4 (CVE-2020-1925)
* springframework (CVE-2020-5421)
* jsf-impl: Mojarra (CVE-2020-6950)
* resteasy (CVE-2020-10688)
* hibernate-validator (CVE-2020-10693)
* wildfly-elytron (CVE-2020-10714)
* undertow (CVE-2020-10719)
* activemq (CVE-2020-13920)
* cxf-core: cxf (CVE-2020-13954)
* fuse-apicurito-operator-container: golang.org/x/text (CVE-2020-14040)
* jboss-ejb-client: wildfly (CVE-2020-14297)
* xercesimpl: wildfly (CVE-2020-14338)
* xnio (CVE-2020-14340)
* flink: apache-flink (CVE-2020-17518)
* resteasy-client (CVE-2020-25633)
* xstream (CVE-2020-26258)
* mybatis (CVE-2020-26945)
* pdfbox (CVE-2021-27807, CVE-2021-27906)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
Installation instructions are available from the Fuse 7.9.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/
4. Bugs fixed (https://bugzilla.redhat.com/):
1443635 - CVE-2017-5645 log4j: Socket receiver deserialization vulnerability
1730462 - CVE-2020-1695 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class
1758619 - CVE-2019-16869 netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
1764640 - CVE-2019-12402 apache-commons-compress: Infinite loop in name encoding algorithm
1772008 - CVE-2019-14887 wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use
1785376 - CVE-2017-18640 snakeyaml: Billion laughs attack via alias feature
1790309 - CVE-2020-1925 olingo-odata: Server side request forgery in AsyncResponseWrapperImpl
1798509 - CVE-2019-20445 netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
1805006 - CVE-2020-6950 Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371
1805501 - CVE-2020-10693 hibernate-validator: Improper input validation in the interpolation of constraint error messages
1806398 - CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
1806835 - CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
1814974 - CVE-2020-10688 RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack
1825714 - CVE-2020-10714 wildfly-elytron: session fixation when using FORM authentication
1828459 - CVE-2020-10719 undertow: invalid HTTP request with large chunk size
1838332 - CVE-2020-9484 tomcat: deserialization flaw in session persistence storage leading to RCE
1845626 - CVE-2020-5410 spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack
1851420 - CVE-2020-11996 tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS
1853595 - CVE-2020-14297 wildfly: Some EJB transaction objects may get accumulated causing Denial of Service
1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
1857024 - CVE-2020-13935 tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
1857040 - CVE-2020-13934 tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS
1860054 - CVE-2020-14338 wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl
1860218 - CVE-2020-14340 xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
1880101 - CVE-2020-13920 activemq: improper authentication allows MITM attack
1881158 - CVE-2020-5421 springframework: RFD protection bypass via jsessionid
1881353 - CVE-2020-25638 hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error
1885485 - CVE-2020-25644 wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
1887257 - CVE-2020-26945 mybatis: mishandles deserialization of object streams which could result in remote code execution
1891132 - CVE-2020-27216 jetty: local temporary directory hijacking vulnerability
1898235 - CVE-2020-13954 cxf: XSS via the styleSheetPath
1903727 - CVE-2020-17510 shiro: specially crafted HTTP request may cause an authentication bypass
1908832 - CVE-2020-26258 XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling
1912881 - CVE-2020-28052 bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible
1913312 - CVE-2020-17518 apache-flink: directory traversal attack allows remote file writing through the REST API
1937440 - CVE-2020-13936 velocity: arbitrary code execution when attacker is able to modify templates
1941050 - CVE-2021-27906 pdfbox: OutOfMemory-Exception while loading a crafted PDF file
1941055 - CVE-2021-27807 pdfbox: infinite loop while loading a crafted PDF file
1945714 - CVE-2021-28165 jetty: Resource exhaustion when receiving an invalid large TLS frame
5. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=jp7z
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
4. ==========================================================================
Ubuntu Security Notice USN-6910-1
July 23, 2024
activemq vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Apache ActiveMQ.
Software Description:
- activemq: Java message broker - server
Details:
Chess Hazlett discovered that Apache ActiveMQ incorrectly handled certain
commands. A remote attacker could possibly use this issue to terminate
the program, resulting in a denial of service. This issue only affected
Ubuntu 16.04 LTS. (CVE-2015-7559)
Peter Stöckli discovered that Apache ActiveMQ incorrectly handled
hostname verification. A remote attacker could possibly use this issue
to perform a person-in-the-middle attack. This issue only affected Ubuntu
16.04 LTS. (CVE-2018-11775)
Jonathan Gallimore and Colm Ó hÉigeartaigh discovered that Apache
ActiveMQ incorrectly handled authentication in certain functions.
A remote attacker could possibly use this issue to perform a
person-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. A remote attacker could possibly use this issue
to acquire unauthenticated access. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. A remote attacker could possibly use this issue to run
arbitrary code. (CVE-2022-41678)
It was discovered that Apache ActiveMQ incorrectly handled
deserialization. A remote attacker could possibly use this issue to run
arbitrary shell commands. (CVE-2023-46604)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
activemq 5.16.1-1ubuntu0.1~esm1
Available with Ubuntu Pro
libactivemq-java 5.16.1-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
activemq 5.15.11-1ubuntu0.1~esm1
Available with Ubuntu Pro
libactivemq-java 5.15.11-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
activemq 5.15.8-2~18.04.1~esm1
Available with Ubuntu Pro
libactivemq-java 5.15.8-2~18.04.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
activemq 5.13.2+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
libactivemq-java 5.13.2+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6910-1
CVE-2015-7559, CVE-2018-11775, CVE-2020-13920, CVE-2021-26117,
CVE-2022-41678, CVE-2023-46604
| VAR-202009-1635 | CVE-2020-11998 | Pillow Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apache ActiveMQ is a set of open source message middleware of the Apache Software Foundation in the United States. It supports Java message services, clusters, Spring Framework, etc. A security vulnerability exists in Apache ActiveMQ version 5.15.13. An attacker could exploit this vulnerability to execute arbitrary code
| VAR-202009-0608 | CVE-2020-16224 | Patient Information Security hole |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
In Patient Information Center iX (PICiX) Versions C.02, C.03, the
software parses a formatted message or structure but does not handle or
incorrectly handles a length field that is inconsistent with the actual
length of the associated data, causing the application on the
surveillance station to restart. A vulnerability exists in Patient Information. The vulnerability stems from special elements that may be interpreted as commands when spreadsheet software opens the file. The following products and versions are affected: B.02, C.02, C.03
| VAR-202009-0607 | CVE-2020-16222 | Philips Patient Information Center iX Authorization problem vulnerability |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
In Patient Information Center iX (PICiX) Version B.02, C.02, C.03, and
PerformanceBridge Focal Point Version A.01, when an actor claims to have
a given identity, the software does not prove or insufficiently proves
the claim is correct. A vulnerability exists in Patient Information. The vulnerability stems from special elements that may be interpreted as commands when spreadsheet software opens the file. The following products and versions are affected: B.02, C.02, C.03
| VAR-202009-0606 | CVE-2020-16220 | Patient Information Security hole |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
In Patient Information Center iX (PICiX) Versions C.02, C.03,
PerformanceBridge Focal Point Version A.01, the product receives input
that is expected to be well-formed (i.e., to comply with a certain
syntax) but it does not validate or incorrectly validates that the input
complies with the syntax, causing the certificate enrollment service to
crash. It does not impact monitoring but prevents new devices from
enrolling. A vulnerability exists in Patient Information. The vulnerability stems from special elements that may be interpreted as commands when spreadsheet software opens the file. The following products and versions are affected: B.02, C.02, C.03. Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX850, and MP2-MP90 Versions N and prior, IntelliVue X3 and X2 Versions N and prior