Philips Security Plan for iSite, IntelliSpace PACS

Thursday, November 8, 2018 @ 03:11 PM gHale

Philips has mitigation recommendations to handle weak password requirements in its iSite and IntelliSpace PACS, according to a report with NCCIC.

Successful exploitation of this vulnerability, which a user discovered and reported it back to the company, may allow an attacker with local network access to impact confidentiality, integrity, and availability of a component of the system.

Fr. Sauter Fix for CASE Suite
Charging Station Vulnerability Cleared
Schneider Updates SESU
InduSoft Web Studio, InTouch Holes Fixed

Philips reports the following versions of iSite and IntelliSpace PACS are affected:
• iSite PACS, all versions
• IntelliSpace PACS, all versions

In the vulnerability, default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.

CVE-2018-17906 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.3.

The product sees use mainly in the healthcare and public health sectors. It also sees action on a global basis. An attacker with low skill level could leverage the vulnerability.

No known public exploits specifically target this vulnerability. This vulnerability is exploitable from within the same local device subnet.

Netherlands-based Philips recommends users ensure IntelliSpace PACS installations run in a managed service environment to minimize the risk of exploitation (Virtual Private Network, Firewall isolation from other networks, no Internet access). In addition, Philips employs an automated Antivirus solution that continuously monitors and remediates threats across all systems in the managed service environment. Philips has a monthly recurring patch program which all IntelliSpace PACS users are encouraged to participate. Users who participate in this program receive all Philips approved operating system and application patches in a timely fashion. The Philips iSite 3.6 platform is currently at its end of life (EoL) and end of service (EoS).

As an interim mitigation to the vulnerability, Philips recommends users:
• Ensure only authorized personnel can connect to the controlled network environment
• Review instructions for use guidelines available with the application interface and follow the security best practices

Philips will continue to add cybersecurity vulnerability remediation improvements through their secure development lifecycle (SDL) as threats continue.

Users with questions regarding specific iSite/IntelliSpace PACS solutions are advised by Philips to contact their customer success manager (CSM), local Philips service support team, or regional service support. Click here for Philips contact information.

Click here to see the Philips product security website for the latest security information.

Leave a Reply

You must be logged in to post a comment.