Trustwave is warning healthcare organizations of two cross-site scripting (XSS) vulnerabilities in Canon Medical’s popular medical imaging sharing tool Vitrea View.
Touted as an enterprise viewing solution, Vitrea View is used by healthcare providers, physicians, and radiologists to securely share medical images that can then be accessed directly from the browser, on both desktop and mobile devices.
The two security holes, which are tracked collectively as CVE-2022-37461, are described as reflected XSS bugs in an error message and in the administrative panel.
According to Trustwave, the flaws could be exploited to retrieve patient information, including stored images and scans, as well as to modify the information. The bugs could also lead to the compromise of sensitive information and credentials for services that are integrated with Vitrea View.
Exploitable without authentication, the first of the vulnerabilities exists in an error page located at /vitrea-view/error/, where all input after the /error/ subdirectory is reflected back to the user.
“Once a user has been coerced into navigating to the affected URL if they have a valid Vitrea View session their session could be used to potentially retrieve patient information, retrieve their stored images or scans and modify their information depending on privileges of the session,” Trustwave says.
Residing in the tool’s administrative panel, the second vulnerability impacts the search function in the ‘Group and Users’ page. When searching for ‘groupID’, ‘offset’, and ‘limit’, the input is reflected back to the user “when text is entered instead of the expected numerical inputs”.
“Like the previous finding, the reflected input is slightly restricted, as it does not allow spaces. Once an authenticated admin is coerced into visiting the affected URL, it is possible to create and modify the Python, JavaScript and Groovy scripts used by the Vitrea View application,” Trustwave explains.
The cybersecurity firm has published proof-of-concept (PoC) code targeting the vulnerability. Canon Medical resolved the identified flaws with the release of Vitrea View version 7.7.6.
Related: FBI Warns of Unpatched and Outdated Medical Device Risks
Related: Rapid7 Flags Multiple Flaws in Sigma Spectrum Infusion Pumps
Related: Medical, IoT Devices From Many Manufacturers Affected by ‘Access:7’ Vulnerabilities

More from Ionut Arghire
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- Vulnerability Provided Access to Toyota Supplier Management Network
- Linux Variant of Cl0p Ransomware Emerges
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
Latest News
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
