The product does not require unique and complex passwords to be created
during installation. Using Philips's default password could jeopardize
the PACS system if the password was hacked or leaked. An attacker could
gain access to the database impacting system availability and data
integrity.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-45259 The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity.
Fixes

Solution

Philips recommends the following mitigations: * For CVE-2021-28165, Philips recommends configuring the Vue PACS environment per D000763414 – Vue_PACS_12_Ports_Protocols_Services_Guide available on Incenter https://incenter.medical.philips.com/Default.aspx . Vue PACS version 12.2.8.410* released in October 2023 prevents this vulnerability. * For CVE-2023-40704, Philips recommends no action needed due to low risk of exploitability, but customers can request that Philips update database password(s). For managed services users, new releases will be made available upon resource availability. Releases are subject to country specific regulations. Users with questions regarding their specific Philips Vue PACS installations and new release eligibility should contact their local Philips sales representative or submit a request in the Philips Informatics Support portal https://www.informatics.support.philips.com/csm . Refer to the Philips advisory https://www.philips.com/productsecurity for more details.


Workaround

No workaround given by the vendor.

History

Wed, 09 Apr 2025 20:30:00 +0000

Type Values Removed Values Added
Description Philips Vue PACS uses default credentials for potentially critical functionality. The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity.
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}

cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N'}


Thu, 05 Sep 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-27T20:32:53.978Z

Reserved: 2023-08-21T22:12:52.587Z

Link: CVE-2023-40704

cve-icon Vulnrichment

Updated: 2024-08-02T18:38:51.075Z

cve-icon NVD

Status : Modified

Published: 2024-07-18T17:15:03.897

Modified: 2025-04-09T21:16:24.990

Link: CVE-2023-40704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.