The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday published an advisory to inform organizations about a total of 15 vulnerabilities affecting Philips Vue healthcare products.
The flaws, many of which exist in third-party components, affect several Philips Clinical Collaboration Platform Portal (Vue PACS) products, including MyVue, Vue Speech and Vue Motion, CISA said.
The security holes are related to improper input validation, memory bugs, improper authentication, insecure/improper initialization of resources, use of expired cryptographic keys, use of weak cryptographic algorithms, improper use of protection mechanisms, data integrity issues, cross-site scripting (XSS), improperly protected credentials, and the cleartext transmission of sensitive data.
“Successful exploitation of these vulnerabilities could allow an unauthorized person or process to eavesdrop, view or modify data, gain system access, perform code execution, install unauthorized software, or affect system data integrity in such a way as to negatively impact the confidentiality, integrity, or availability of the system,” CISA said in its advisory.
Of the 15 vulnerabilities, 7 appear to be specific to Philips products, while the rest impact third-party components such as Redis, 7-Zip, Oracle Database, jQuery, Python, and Apache Tomcat.
The third-party component flaws were identified between 2012 and 2020. The issues specific to Philips all have 2021 CVE identifiers.
Four of the vulnerabilities have been rated critical and four have a high severity rating. The rest are considered medium or low severity.
According to CISA, some of the vulnerabilities have been fixed, but others are only expected to receive patches in the first quarter of 2022. In the meantime, organizations can implement mitigations that reduce the risk of exploitation.
While CISA does reference a security advisory from Philips, the electronics company does not appear to have released a public advisory.
“CISA encourages users and administrators to review the ICS medical advisory ICSMA-21-187-01 Philips Vue PACS and to apply the necessary updates or workarounds,” CISA said.
Related: Over 100 GE Healthcare Devices Affected by Critical Vulnerability
Related: Critical OpenEMR Vulnerabilities Give Hackers Remote Access to Health Records
Related: Philips Working on Patches for 35 Flaws in Healthcare Product

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
Latest News
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
