CVE-2023-40704: CWE-1392 Use of Default Credentials in Philips Vue PACS
The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity.
AI Analysis
Technical Summary
CVE-2023-40704 identifies a vulnerability in Philips Vue PACS (Picture Archiving and Communication System) related to the use of default credentials during installation. Specifically, the system does not enforce the creation of unique and complex passwords, allowing the default Philips password to remain active. This weakness falls under CWE-1392, which concerns the use of default credentials that are often well-known or easily guessable. An attacker who obtains or guesses these default credentials can gain unauthorized access to the PACS database. Such access could lead to significant impacts on system availability and data integrity, as the attacker might manipulate, delete, or disrupt medical imaging data. The vulnerability has a CVSS 3.1 base score of 6.8, categorized as medium severity, with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the presence of default credentials is a common and easily exploitable security flaw, especially in healthcare environments where PACS systems are critical for clinical workflows. The lack of enforced password complexity during installation increases the risk that default credentials remain unchanged, making the system vulnerable to credential-based attacks. Given the critical nature of medical imaging data and the role of PACS in patient care, this vulnerability poses a significant risk to healthcare providers using Philips Vue PACS.
Potential Impact
For European organizations, particularly healthcare providers, this vulnerability could lead to unauthorized access to sensitive medical imaging data, potentially violating patient privacy regulations such as GDPR. Compromise of the PACS database could disrupt clinical operations by affecting the availability of imaging data, delaying diagnoses and treatments. Data integrity impacts could result in corrupted or altered images, leading to misdiagnosis or treatment errors. Additionally, unauthorized access could facilitate lateral movement within hospital networks, increasing the risk of broader system compromise. The medium CVSS score reflects that while exploitation requires some privileges and network proximity, the consequences of a successful attack are severe. Given the critical role of PACS in healthcare infrastructure, any disruption or data breach could have serious patient safety and regulatory compliance implications. European healthcare organizations are often targeted due to the value of medical data and the criticality of healthcare services, making this vulnerability particularly concerning in this region.
Mitigation Recommendations
1. Enforce immediate password changes: Organizations should ensure that default credentials are changed during or immediately after installation. This can be enforced through installation policies or configuration management tools. 2. Implement strong password policies: Require complex, unique passwords for all PACS system accounts, including administrative and service accounts. 3. Network segmentation: Isolate PACS systems on dedicated network segments with strict access controls to limit exposure to adjacent network attackers. 4. Multi-factor authentication (MFA): Where possible, enable MFA for access to PACS administrative interfaces to reduce the risk of credential compromise. 5. Regular audits and monitoring: Conduct periodic audits to verify that default credentials are not in use and monitor access logs for suspicious activity. 6. Vendor coordination: Engage with Philips to obtain patches or updates that enforce password complexity and remove default credentials. 7. Incident response planning: Prepare for potential compromise scenarios involving PACS systems, including data integrity verification and recovery procedures. 8. User training: Educate IT and clinical staff about the risks of default credentials and the importance of secure credential management specific to medical devices and systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Switzerland, Norway
CVE-2023-40704: CWE-1392 Use of Default Credentials in Philips Vue PACS
Description
The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity.
AI-Powered Analysis
Technical Analysis
CVE-2023-40704 identifies a vulnerability in Philips Vue PACS (Picture Archiving and Communication System) related to the use of default credentials during installation. Specifically, the system does not enforce the creation of unique and complex passwords, allowing the default Philips password to remain active. This weakness falls under CWE-1392, which concerns the use of default credentials that are often well-known or easily guessable. An attacker who obtains or guesses these default credentials can gain unauthorized access to the PACS database. Such access could lead to significant impacts on system availability and data integrity, as the attacker might manipulate, delete, or disrupt medical imaging data. The vulnerability has a CVSS 3.1 base score of 6.8, categorized as medium severity, with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the presence of default credentials is a common and easily exploitable security flaw, especially in healthcare environments where PACS systems are critical for clinical workflows. The lack of enforced password complexity during installation increases the risk that default credentials remain unchanged, making the system vulnerable to credential-based attacks. Given the critical nature of medical imaging data and the role of PACS in patient care, this vulnerability poses a significant risk to healthcare providers using Philips Vue PACS.
Potential Impact
For European organizations, particularly healthcare providers, this vulnerability could lead to unauthorized access to sensitive medical imaging data, potentially violating patient privacy regulations such as GDPR. Compromise of the PACS database could disrupt clinical operations by affecting the availability of imaging data, delaying diagnoses and treatments. Data integrity impacts could result in corrupted or altered images, leading to misdiagnosis or treatment errors. Additionally, unauthorized access could facilitate lateral movement within hospital networks, increasing the risk of broader system compromise. The medium CVSS score reflects that while exploitation requires some privileges and network proximity, the consequences of a successful attack are severe. Given the critical role of PACS in healthcare infrastructure, any disruption or data breach could have serious patient safety and regulatory compliance implications. European healthcare organizations are often targeted due to the value of medical data and the criticality of healthcare services, making this vulnerability particularly concerning in this region.
Mitigation Recommendations
1. Enforce immediate password changes: Organizations should ensure that default credentials are changed during or immediately after installation. This can be enforced through installation policies or configuration management tools. 2. Implement strong password policies: Require complex, unique passwords for all PACS system accounts, including administrative and service accounts. 3. Network segmentation: Isolate PACS systems on dedicated network segments with strict access controls to limit exposure to adjacent network attackers. 4. Multi-factor authentication (MFA): Where possible, enable MFA for access to PACS administrative interfaces to reduce the risk of credential compromise. 5. Regular audits and monitoring: Conduct periodic audits to verify that default credentials are not in use and monitor access logs for suspicious activity. 6. Vendor coordination: Engage with Philips to obtain patches or updates that enforce password complexity and remove default credentials. 7. Incident response planning: Prepare for potential compromise scenarios involving PACS systems, including data integrity verification and recovery procedures. 8. User training: Educate IT and clinical staff about the risks of default credentials and the importance of secure credential management specific to medical devices and systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2023-08-21T22:12:52.587Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed0e1
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 4:51:09 PM
Last updated: 8/12/2025, 8:56:50 PM
Views: 26
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.