Nov 20, 2021
0 0

2 unpatched vulnerabilities identified in Philips IntelliBridge EC40 and EC80 Hub that are used to transfer data been medical devices

Written by

A Philips security alert reveals the discovery of two vulnerabilities in the IntelliBridge EC40 and IntellBridge EC80 hubs whose successful exploitation would allow threat actors to perform all kinds of malicious activities. As users may remember, Philips IntelliBridge EC40/80 hubs enable data transfer between medical devices in different formats. The hubs do not alter in any way the settings set by the professionals who use these devices.
Tracked as CVE-2021-32993, the first of these flaws exists due to the use of code-encoded credentials of the affected implementations. An unauthenticated remote threat actor could gain access by using these credentials.
The vulnerability received a score of 7.4/10 according to the Common Vulnerability Scoring System (CVSS) and its successful exploitation would allow the total compromise of the exposed systems. The risk increases considering that this vulnerability has not been addressed by the manufacturer.
Moreover, CVE-2021-33017 exists because affected systems have an alternate path or channel that does not require authentication for access, so local threat actors could access information that would otherwise be restricted.
The flaw received a CVSS score of 7.4/10 and, like CVE-2021-32993, lacks available security patches.
According to the report, the flaws reside in the following versions of the affected products:
Due to the absence of updates addressing these vulnerabilities, Philips issued some recommendations that operators of these hubs should adhere to in order to mitigate the risk of exploitation:
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.


Article Categories:

Comments are closed.