during installation. Using Philips's default password could jeopardize
the PACS system if the password was hacked or leaked. An attacker could
gain access to the database impacting system availability and data
integrity.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-45259 | The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity. |
Solution
Philips recommends the following mitigations: * For CVE-2021-28165, Philips recommends configuring the Vue PACS environment per D000763414 – Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter https://incenter.medical.philips.com/Default.aspx . Vue PACS version 12.2.8.410* released in October 2023 prevents this vulnerability. * For CVE-2023-40704, Philips recommends no action needed due to low risk of exploitability, but customers can request that Philips update database password(s). For managed services users, new releases will be made available upon resource availability. Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact their local Philips sales representative or submit a request in the Philips Informatics Support portal https://www.informatics.support.philips.com/csm . Refer to the Philips advisory https://www.philips.com/productsecurity for more details.
Workaround
No workaround given by the vendor.
Wed, 09 Apr 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Philips Vue PACS uses default credentials for potentially critical functionality. | The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity. |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Sep 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-Other |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-27T20:32:53.978Z
Reserved: 2023-08-21T22:12:52.587Z
Link: CVE-2023-40704

Updated: 2024-08-02T18:38:51.075Z

Status : Modified
Published: 2024-07-18T17:15:03.897
Modified: 2025-04-09T21:16:24.990
Link: CVE-2023-40704

No data.

No data.