Show plain JSON{"containers": {"cna": {"affected": [{"product": "Patient Information Center iX (PIC iX)", "vendor": "Philips", "versions": [{"status": "affected", "version": "C.02"}, {"status": "affected", "version": "C.03"}]}], "credits": [{"lang": "en", "value": "Younes Dragoni, Andrea Palanca and Ivan Speziale of Nozomi Networks"}], "datePublic": "2021-11-18T00:00:00", "descriptions": [{"lang": "en", "value": "Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-12-27T18:48:22", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-322-02"}], "source": {"advisory": "ICSMA-21-322-02", "discovery": "UNKNOWN"}, "title": "Philips Patient Information Center iX (PIC iX) and Efficia CM Series Improper Input Validation", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-11-18T15:34:00.000Z", "ID": "CVE-2021-43548", "STATE": "PUBLIC", "TITLE": "Philips Patient Information Center iX (PIC iX) and Efficia CM Series Improper Input Validation"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Patient Information Center iX (PIC iX)", "version": {"version_data": [{"version_affected": "=", "version_value": "C.02"}, {"version_affected": "=", "version_value": "C.03"}]}}]}, "vendor_name": "Philips"}]}}, "credit": [{"lang": "eng", "value": "Younes Dragoni, Andrea Palanca and Ivan Speziale of Nozomi Networks"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-20 Improper Input Validation"}]}]}, "references": {"reference_data": [{"name": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-322-02", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-322-02"}]}, "solution": [{"lang": "en"}], "source": {"advisory": "ICSMA-21-322-02", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T04:03:07.652Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-21-322-02"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-43548", "datePublished": "2021-12-27T18:48:22.881596Z", "dateReserved": "2021-11-08T00:00:00", "dateUpdated": "2024-09-16T16:38:33.233Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}