Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability
                             15 November 2017


        AusCERT Security Bulletin Summary

Product:           IntelliSpace Cardiovascular System
Publisher:         Philips
Operating System:  Windows
Impact/Access:     Administrator Compromise -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-14111  

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSMA-17-318-01)
Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability
Original release date: November 14, 2017

All information products included in http://ics-cert.us-cert.gov are provided
"as is" for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see http://www.us-cert.gov/tlp/.


Philips reported a vulnerability in the Philips’ IntelliSpace Cardiovascular
and Xcelera cardiac image and information management systems. Philips has
produced updates that mitigate this vulnerability in the affected products.

This vulnerability could be exploited remotely.


Philips reports that the vulnerability affects the following versions of the
IntelliSpace Cardiovascular and Xcelera cardiac image and information
management systems:

IntelliSpace Cardiovascular, Version 2.3.0 and prior, and Xcelera, R4.1L1 and prior.


Successful exploitation of this vulnerability could allow an attacker to gain
unauthorized access to sensitive information stored on the system, modify
device configuration, and gain access to connected devices.

Impact to individual organizations depends on many factors that are unique to
each organization. NCCIC/ICS-CERT recommends that organizations evaluate the
impact of this vulnerability based on their operational environment and
specific clinical usage.


Philips is a global company that maintains offices in many countries around the
world, including countries in Africa, Asia, Europe, Latin America, the Middle
East, and North America.

The Philips IntelliSpace Cardiovascular and Xcelera systems (a predecessor to
IntelliSpace Cardiovascular) are comprehensive cardiac image and information
management software.

According to Philips, IntelliSpace Cardiovascular and Xcelera systems are
deployed across the Healthcare and Public Health sector. Philips estimates
these products are used worldwide.



Credentials are stored in cleartext in system files that may allow an attacker
with elevated privileges to gain unauthorized access to data to include patient
health information, system resources, and misuse of connected assets.
CVE-2017-14111 [b] has been assigned to this vulnerability. A CVSS v3 base score
of 7.2 has been assigned; the CVSS vector string is



This vulnerability could be exploited remotely.


No known public exploits specifically target this vulnerability.


An attacker with a low skill level would be able to exploit this vulnerability.


Philips is producing software hotfix updates for all IntelliSpace
Cardiovascular and latest Xcelera versions, some of which are available upon
request, while other versions are in the process of development and are
expected to be completed by the end of 2017.

Philips has initiated a voluntary medical device correction aligned with
IntelliSpace Cardiovascular proactive field change order (reference
FCO83000202) to be issued as IntelliSpace Cardiovascular updates become

Users with questions regarding their specific IntelliSpace Cardiovascular or
Xcelera installations are advised by Philips to contact their local Philips
service support team or their regional service support. Philips’ contact
information is available at the following location:

Please see the Philips product security web site for the latest security
information for Philips products:

ICS-CERT recommends that users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. Specifically, users should:
- - Minimize network exposure for all medical devices and/or systems, and ensure
  that they are not accessible from the Internet.
- - Locate all medical devices and remote devices behind firewalls, and isolate
  them from the business network.
- - When remote access is required, use secure methods, such as Virtual Private
  Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be
  updated to the most current version available. Also recognize that VPN is
  only as secure as the connected devices.

ICS-CERT also provides a section for security recommended practices on the
ICS-CERT web page at http://ics-cert.us-cert.gov/content/recommended-practices.
ICS-CERT reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

Additional mitigation guidance and recommended practices are publicly available
in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber
Intrusion Detection and Mitigation Strategies, that is available for download
from the ICS-CERT web site (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to ICS-CERT for
tracking and correlation against other incidents.

a. CWE-522: Insufficiently Protected Credentials,
  http://cwe.mitre.org/data/definitions/522.html, web site last accessed November
  14, 2017.
b. NVD, https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14111, NIST uses
  this advisory to create the CVE web site report. This web site will be active
  sometime after publication of this advisory.
c. CVSS Calculator,
  web site last accessed November 14, 2017.

Contact Information
For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov (link sends e-mail)
Toll Free: 1-877-776-7585
International Callers: (208) 526-0900
For industrial control systems security information and incident reporting:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967