Canon Medical Product Vulnerabilities Expose Patient Information
Residence › Vulnerabilities
Canon Medical Product Vulnerabilities Expose Affected person Data
By Ionut Arghire on September 30, 2022
Tweet
Trustwave is warning healthcare organizations of two cross-site scripting (XSS) vulnerabilities in Canon Medical’s in style medical imaging sharing instrument Vitrea View.
Touted as an enterprise viewing answer, Vitrea View is utilized by healthcare suppliers, physicians, and radiologists to securely share medical photographs that may then be accessed instantly from the browser, on each desktop and cell gadgets.
The 2 safety holes, that are tracked collectively as CVE-2022-37461, are described as mirrored XSS bugs in an error message and within the administrative panel.
In response to Trustwave, the failings could possibly be exploited to retrieve affected person info, together with saved photographs and scans, in addition to to switch the data. The bugs might additionally result in the compromise of delicate info and credentials for providers which might be built-in with Vitrea View.
Exploitable with out authentication, the primary of the vulnerabilities exists in an error web page situated at /vitrea-view/error/, the place all enter after the /error/ subdirectory is mirrored again to the person.
“As soon as a person has been coerced into navigating to the affected URL if they’ve a sound Vitrea View session their session could possibly be used to doubtlessly retrieve affected person info, retrieve their saved photographs or scans and modify their info relying on privileges of the session,” Trustwave says.
Residing within the instrument’s administrative panel, the second vulnerability impacts the search perform within the ‘Group and Customers’ web page. When trying to find ‘groupID’, ‘offset’, and ‘restrict’, the enter is mirrored again to the person “when textual content is entered as a substitute of the anticipated numerical inputs”.
“Just like the earlier discovering, the mirrored enter is barely restricted, because it doesn’t permit areas. As soon as an authenticated admin is coerced into visiting the affected URL, it’s doable to create and modify the Python, JavaScript and Groovy scripts utilized by the Vitrea View utility,” Trustwave explains.
The cybersecurity agency has revealed proof-of-concept (PoC) code concentrating on the vulnerability. Canon Medical resolved the recognized flaws with the discharge of Vitrea View model 7.7.6.
Associated: FBI Warns of Unpatched and Outdated Medical Machine Dangers
Associated: Rapid7 Flags A number of Flaws in Sigma Spectrum Infusion Pumps
Associated: Medical, IoT Units From Many Producers Affected by ‘Entry:7’ Vulnerabilities
Get the Each day Briefing
- Most Latest
- Most Learn
- Canon Medical Product Vulnerabilities Expose Affected person Data
- What’s Occurring With Cybersecurity VC Investments?
- CISA Points Steerage on Transitioning to TLP 2.0
- DoD Pronounces Closing Outcomes of ‘Hack US’ Bug Bounty Program
- Microsoft Confirms Exploitation of Two Alternate Server Zero-Days
- Chinese language Cyberespionage Group ‘Witchetty’ Updates Toolset in Latest Assaults
- Cisco Patches Excessive-Severity Vulnerabilities in Networking Software program
- Microsoft Alternate Assaults: Zero-Day or New ProxyShell Exploit?
- NSA Cyber Specialist, Military Physician Charged in US Spying Instances
- North Korean Gov Hackers Caught Rigging Legit Software program
In search of Malware in All of the Unsuitable Locations?
First Step For The Web’s subsequent 25 years: Including Safety to the DNS
Tattle Story: What Your Laptop Says About You
Be in a Place to Act By way of Cyber Situational Consciousness
Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant
2010, A Nice Yr To Be a Scammer.
Do not Let DNS be Your Single Level of Failure
Find out how to Establish Malware in a Blink
Defining and Debating Cyber Warfare
The 5 A’s that Make Cybercrime so Engaging
Find out how to Defend In opposition to DDoS Assaults
Safety Budgets Not in Line with Threats
Anycast – Three Causes Why Your DNS Community Ought to Use It
The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations
Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise