ID

VAR-201806-0568


CVE

CVE-2018-10597


TITLE

plural Philips Authentication vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-006286

DESCRIPTION

IntelliVue Patient Monitors MP Series (including MP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M, IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only), and Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3 have a vulnerability that allows an unauthenticated attacker to access memory ("write-what-where") from an attacker-chosen device address within the same subnet. plural Philips The product contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Philips IntelliVuePatientMonitorsMP2 and so on are all products of the Dutch company Philips. The Philips IntelliVuePatientMonitors MP2 is an MP series patient monitor device. The AvalonFetal/MaternalMonitorsFM20 is a maternal and child monitor device. Unauthorized access vulnerabilities exist in several Philips products. An attacker could exploit the vulnerability to access memory from its selected device address (within the same subnet). The following products and versions are affected: Philips IntelliVue Patient Monitors MP2/X2/MP30/MP50/MP70/NP90/MX700/800 Rev. B to Rev. M; IntelliVue Patient Monitors MX400-550 Rev. J to Rev. M; X3/ MX100 M revision; Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 using F.0, G.0 and J.3 software revisions

Trust: 2.43

sources: NVD: CVE-2018-10597 // JVNDB: JVNDB-2018-006286 // CNVD: CNVD-2018-11071 // IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1 // VULHUB: VHN-120372

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1 // CNVD: CNVD-2018-11071

AFFECTED PRODUCTS

vendor:philipsmodel:avalon fetal\/maternal monitors fm20scope:eqversion: -

Trust: 1.6

vendor:philipsmodel:avalon fetal\/maternal monitors fm40scope:eqversion: -

Trust: 1.6

vendor:philipsmodel:avalon fetal\/maternal monitors fm30scope:eqversion: -

Trust: 1.6

vendor:philipsmodel:avalon fetal\/maternal monitors fm50scope:eqversion: -

Trust: 1.6

vendor:philipsmodel:intellivue mx450scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mp30scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mp50scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue x2scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx550scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx800scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mp2scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx700scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mp70scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx500scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue x3scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx400scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue np90scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:intellivue mx100scope:eqversion: -

Trust: 1.0

vendor:philipsmodel:avalon fetal/maternal monitors fm20scope: - version: -

Trust: 0.8

vendor:philipsmodel:avalon fetal/maternal monitors fm30scope: - version: -

Trust: 0.8

vendor:philipsmodel:avalon fetal/maternal monitors fm40scope: - version: -

Trust: 0.8

vendor:philipsmodel:avalon fetal/maternal monitors fm50scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mp2scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mp30scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mp50scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mp70scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx100scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx400scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx450scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx500scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx550scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx700scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors mx800scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors np90scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors x2scope: - version: -

Trust: 0.8

vendor:philipsmodel:intellivue patient monitors x3scope: - version: -

Trust: 0.8

vendor:philipsmodel:avalon fetal/maternal monitors fm20/fm30/fm40/fm50 f.0scope: - version: -

Trust: 0.6

vendor:philipsmodel:avalon fetal/maternal monitors fm20/fm30/fm40/fm50 g.0scope: - version: -

Trust: 0.6

vendor:philipsmodel:avalon fetal/maternal monitors fm20/fm30/fm40/fm50 j.3scope: - version: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mp2/x2/mp30/mp50/mp70/np90/mx700/800 >=b,<=mscope: - version: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx400-550 >=j,<=mscope: - version: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitorsx3/mx100 mscope: - version: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx800scope:eqversion: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx550scope:eqversion: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors x3scope:eqversion: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx500scope:eqversion: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx100scope:eqversion: -

Trust: 0.6

vendor:philipsmodel:intellivue patient monitors mx450scope:eqversion: -

Trust: 0.6

vendor:intellivue patient monitors mp2model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx450model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx500model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx550model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors x3model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx100model: - scope:eqversion: -

Trust: 0.2

vendor:avalon fetal maternal monitors fm20model: - scope:eqversion: -

Trust: 0.2

vendor:avalon fetal maternal monitors fm30model: - scope:eqversion: -

Trust: 0.2

vendor:avalon fetal maternal monitors fm40model: - scope:eqversion: -

Trust: 0.2

vendor:avalon fetal maternal monitors fm50model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors x2model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mp30model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mp50model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mp70model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors np90model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx700model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx800model: - scope:eqversion: -

Trust: 0.2

vendor:intellivue patient monitors mx400model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1 // CNVD: CNVD-2018-11071 // JVNDB: JVNDB-2018-006286 // CNNVD: CNNVD-201806-305 // NVD: CVE-2018-10597

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10597
value: HIGH

Trust: 1.0

NVD: CVE-2018-10597
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-11071
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201806-305
value: HIGH

Trust: 0.6

IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-120372
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-10597
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11071
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-120372
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-10597
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2018-10597
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1 // CNVD: CNVD-2018-11071 // VULHUB: VHN-120372 // JVNDB: JVNDB-2018-006286 // CNNVD: CNNVD-201806-305 // NVD: CVE-2018-10597

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-120372 // JVNDB: JVNDB-2018-006286 // NVD: CVE-2018-10597

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201806-305

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201806-305

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006286

PATCH

title:Top Pageurl:https://www.usa.philips.com/healthcare

Trust: 0.8

title:Patches for unauthorized access to a number of Philips productsurl:https://www.cnvd.org.cn/patchInfo/show/131447

Trust: 0.6

sources: CNVD: CNVD-2018-11071 // JVNDB: JVNDB-2018-006286

EXTERNAL IDS

db:NVDid:CVE-2018-10597

Trust: 3.3

db:ICS CERTid:ICSMA-18-156-01

Trust: 3.1

db:CNVDid:CNVD-2018-11071

Trust: 0.8

db:CNNVDid:CNNVD-201806-305

Trust: 0.8

db:JVNDBid:JVNDB-2018-006286

Trust: 0.8

db:IVDid:E2F21E9E-39AB-11E9-AB1D-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-120372

Trust: 0.1

sources: IVD: e2f21e9e-39ab-11e9-ab1d-000c29342cb1 // CNVD: CNVD-2018-11071 // VULHUB: VHN-120372 // JVNDB: JVNDB-2018-006286 // CNNVD: CNNVD-201806-305 // NVD: CVE-2018-10597

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsma-18-156-01

Trust: 3.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10597

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-10597

Trust: 0.8

url:https://www.philips.com/productsecurity

Trust: 0.6

sources: CNVD: CNVD-2018-11071 // VULHUB: VHN-120372 // JVNDB: JVNDB-2018-006286 // CNNVD: CNNVD-201806-305 // NVD: CVE-2018-10597

SOURCES

db:IVDid:e2f21e9e-39ab-11e9-ab1d-000c29342cb1
db:CNVDid:CNVD-2018-11071
db:VULHUBid:VHN-120372
db:JVNDBid:JVNDB-2018-006286
db:CNNVDid:CNNVD-201806-305
db:NVDid:CVE-2018-10597

LAST UPDATE DATE

2024-11-23T22:55:52.292000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11071date:2018-06-07T00:00:00
db:VULHUBid:VHN-120372date:2020-09-04T00:00:00
db:JVNDBid:JVNDB-2018-006286date:2018-08-15T00:00:00
db:CNNVDid:CNNVD-201806-305date:2020-09-07T00:00:00
db:NVDid:CVE-2018-10597date:2024-11-21T03:41:37.970

SOURCES RELEASE DATE

db:IVDid:e2f21e9e-39ab-11e9-ab1d-000c29342cb1date:2018-06-07T00:00:00
db:CNVDid:CNVD-2018-11071date:2018-06-08T00:00:00
db:VULHUBid:VHN-120372date:2018-06-05T00:00:00
db:JVNDBid:JVNDB-2018-006286date:2018-08-15T00:00:00
db:CNNVDid:CNNVD-201806-305date:2018-06-06T00:00:00
db:NVDid:CVE-2018-10597date:2018-06-05T20:29:00.827