Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100813 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSMA-17-255-01 | Third Party Advisory US Government Resource |
https://www.usa.philips.com/healthcare/about/customer-support/product-security | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-04-30 15:29
Updated : 2024-02-28 16:25
NVD link : CVE-2017-9658
Mitre link : CVE-2017-9658
CVE.ORG link : CVE-2017-9658
JSON object : View
Products Affected
philips
- intellivue_mx40_firmware
- intellivue_mx40
CWE
CWE-755
Improper Handling of Exceptional Conditions