Philips will provide a remediation patch for specific supported versions, as well as an upgrade path for all versions of its IntelliVue Patient Monitors and Avalon Fetal/Maternal Monitors, according to a report from NCCIC.
The vulnerabilities, discovered by Oran Avraham of Medigate, are an improper authentication, information exposure, and a stack-based buffer overflow.
Successful exploitation may allow an attacker to read/write memory, and/or induce a denial of service through a system restart, thus potentially leading to a delay in diagnosis and treatment of patients.
The following IntelliVue Patient Monitors versions suffer from the issues:
• IntelliVue Patient Monitors MP Series (includingMP2/X2/MP30/MP50/MP70/NP90/MX700/800) Rev B-M
• IntelliVue Patient Monitors MX (MX400-550) Rev J-M and (X3/MX100 for Rev M only).
The following Avalon Fetal/Maternal Monitors versions are vulnerable:
• Avalon Fetal/Maternal Monitors FM20/FM30/FM40/FM50 with software Revisions F.0, G.0 and J.3
In one of the vulnerabilities, it is possible for an unauthenticated attacker to access memory (“write-what-where”) from an attacker-chosen device address within the same subnet.
CVE-2018-10597 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.3.
In addition, it is possible for an attacker to read memory from an attacker-chosen device address within the same subnet.
CVE-2018-10599 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.4.
Also, the products suffer exposure to an “echo” service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.
CVE-2018-10601 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.2.
The products see use mainly in the healthcare and public health sectors. They also see action on a global basis.
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable from within the same local device subnet. High skill level is needed to exploit.
Netherlands-based Philips will provide a remediation patch for specific supported versions, as well as an upgrade path for all versions. Philips will communicate service options to all affected install-base users.
Philips recommends users obtain associated field change and service bulletin information from Philips by accessing their InCenter account.
Click on the Philips product security website for the latest public security information on this matter and for other Philips products.
Philips provides the following mitigations for these vulnerabilities:
• In order for users of affected devices to mitigate exposure to these vulnerabilities, Philips recommends following the device’s labeling, including Instructions for Use and Service Guide(s), which provide compensating controls to mitigate these vulnerabilities. Philips will provide remediation for IntelliVue software Revisions J-M and Avalon software Revisions G.0 and J.3 in 2018 in the form of a patch. For users with earlier IntelliVue software revisions, Philips provides an upgrade path for a currently-supported software revision. For upgrade options, users should contact their Philips sales representative.
• For IntelliVue Monitors – To mitigate these vulnerabilities; Philips recommends users follow the instructions for use (Security for Clinical Networks Guide) physical and logical security. Additionally, Philips recommends users update to Revision K.2 or newer software.
• For Avalon Fetal Monitors Release G.0 and Release J.3 – Philips recommends users follow the installation and service manual (Data Privacy and Network Security Requirements).
• For Avalon Fetal Monitors Release F.0 – Philips recommends users follow the instructions as documented in the Rev J.3 Service Guide Data Privacy and Network Security Requirements section.
• Users with questions regarding their specific IntelliVue and Avalon Fetal Monitor installations are advised by Philips to contact their local Philips service support team or their regional service support.
Philips also recommends the following:
• The Philips Security for Clinical Networks guide and the IntelliVue Clinical Networks Configuration Guide, which provide instructions for the use of physical security access controls.
• The Avalon Revision J.3 Service Guide Data Privacy and Network Security Requirements section provides instructions for use of physical and logical security access controls.
• The Philips Security for Clinical Networks Guide and the IntelliVue Clinical Networks Configuration Guide, which provide instructions for use of logical security access controls. There is no clinical requirement for these devices to communicate outside of the Philips clinical network.
• Locate all medical devices and remote devices behind firewalls and isolate them from the business network following the recommendations documented in the Philips Security for Clinical Networks Guide, and the IntelliVue Clinical Networks Configuration Guide.