Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Canon Medical Product Vulnerabilities Expose Patient Information

Trustwave is warning healthcare organizations of two cross-site scripting (XSS) vulnerabilities in Canon Medical’s popular medical imaging sharing tool Vitrea View.

Trustwave is warning healthcare organizations of two cross-site scripting (XSS) vulnerabilities in Canon Medical’s popular medical imaging sharing tool Vitrea View.

Touted as an enterprise viewing solution, Vitrea View is used by healthcare providers, physicians, and radiologists to securely share medical images that can then be accessed directly from the browser, on both desktop and mobile devices.

The two security holes, which are tracked collectively as CVE-2022-37461, are described as reflected XSS bugs in an error message and in the administrative panel.

According to Trustwave, the flaws could be exploited to retrieve patient information, including stored images and scans, as well as to modify the information. The bugs could also lead to the compromise of sensitive information and credentials for services that are integrated with Vitrea View.

Exploitable without authentication, the first of the vulnerabilities exists in an error page located at /vitrea-view/error/, where all input after the /error/ subdirectory is reflected back to the user.

“Once a user has been coerced into navigating to the affected URL if they have a valid Vitrea View session their session could be used to potentially retrieve patient information, retrieve their stored images or scans and modify their information depending on privileges of the session,” Trustwave says.

Advertisement. Scroll to continue reading.

Residing in the tool’s administrative panel, the second vulnerability impacts the search function in the ‘Group and Users’ page. When searching for ‘groupID’, ‘offset’, and ‘limit’, the input is reflected back to the user “when text is entered instead of the expected numerical inputs”.

“Like the previous finding, the reflected input is slightly restricted, as it does not allow spaces. Once an authenticated admin is coerced into visiting the affected URL, it is possible to create and modify the Python, JavaScript and Groovy scripts used by the Vitrea View application,” Trustwave explains.

The cybersecurity firm has published proof-of-concept (PoC) code targeting the vulnerability. Canon Medical resolved the identified flaws with the release of Vitrea View version 7.7.6.

Related: FBI Warns of Unpatched and Outdated Medical Device Risks

Related: Rapid7 Flags Multiple Flaws in Sigma Spectrum Infusion Pumps

Related: Medical, IoT Devices From Many Manufacturers Affected by ‘Access:7’ Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.