脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
N/A
脆弱性説明
Certain 802.11 network management messages have been determined to invoke wireless access point blacklisting security defenses when not required, which can necessitate intervention by hospital staff to reset the device and reestablish a network connection to the Wi-Fi access point. During this state, the Philips IntelliVue MX40 Version B.06.18 can either connect to an alternative access point within signal range for association to a central monitoring station, or it can remain in local monitoring mode until the device is reset by hospital staff. CVSS v3 base score: 6.5, CVSS vector string: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Philips has released software update, Version B.06.18, to fix the improper cleanup on thrown exception vulnerability, and implement mitigations to reduce the risk associated with the improper handling of exceptional conditions vulnerability. The software update implements messaging and alarming on the MX40 and at the central monitoring station, when the MX40 disconnects from the access point.
CVSS情報
N/A
脆弱性タイプ
对异常条件的处理不恰当
脆弱性タイトル
Philips IntelliVue MX40 Patient Worn Monitor 安全漏洞
脆弱性説明
Philips IntelliVue MX40 Patient Worn Monitor是荷兰飞利浦(Philips)公司的一款医疗监护设备。 Philips IntelliVue MX40 Patient Worn Monitor B.06.18之前的版本(仅限WLAN)中存在安全漏洞,该漏洞源于程序没有正确的处理异常情况。当设备运行在802.11 WLAN时,攻击者可利用该漏洞发布802.11 Wi-Fi管理命令,造成拒绝服务。
CVSS情報
N/A
脆弱性タイプ
N/A