漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
CVSS Information
N/A
Vulnerability Type
对异常条件的处理不恰当
Vulnerability Title
Philips IntelliVue MX40 Patient Worn Monitor 安全漏洞
Vulnerability Description
Philips IntelliVue MX40 Patient Worn Monitor是荷兰飞利浦(Philips)公司的一款医疗监护设备。 Philips IntelliVue MX40 Patient Worn Monitor B.06.18之前的版本(仅限WLAN)中存在安全漏洞,该漏洞源于程序没有正确的处理异常情况。当设备运行在802.11 WLAN时,攻击者可利用该漏洞发布802.11 Wi-Fi管理命令,造成拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A