Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-19743 | Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Solution
Philips has released the following plans to address these vulnerabilities: Philips recommends configuring the Vue PACS environment per D000763414 – Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter. Philips released Version 12.2.8.0 in May of 2021 for Speech to remediate this issue and recommends contacting support. Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact a Philips Sales representative or submit a quote request in the eService portal at: Login - eService (philips.com) The Philips advisory is available. Please see the Philips product security website for the latest security information for Philips products.
Workaround
No workaround given by the vendor.
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:32:46.240Z
Reserved: 2021-05-13T00:00:00.000Z
Link: CVE-2021-33022

Updated: 2024-08-03T23:42:19.159Z

Status : Modified
Published: 2022-04-01T23:15:10.253
Modified: 2024-11-21T06:08:08.650
Link: CVE-2021-33022

No data.

No data.