Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

13 vulnerabilities by GE Healthcare

CVE-2024-27110 (GCVE-0-2024-27110)

Vulnerability from cvelistv5 – Published: 2024-05-14 17:16 – Updated: 2024-08-02 00:27
VLAI?
Title
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
Summary
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
CWE
  • CWE-250 - Execution with Unnecessary Privileges
Assigner
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "image_vault",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_software",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_turnkey",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27110",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:22:50.224196Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:46:21.733Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:27:59.489Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Software Only",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ImageVault",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Turnkey",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Elevation of privilege vulnerability in GE HealthCare EchoPAC products"
            }
          ],
          "value": "Elevation of privilege vulnerability in GE HealthCare EchoPAC products"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-69",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-69 Target Programs with Elevated Privileges"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "CWE-250 Execution with Unnecessary Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T17:16:39.659Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Elevation of privilege vulnerability in GE HealthCare EchoPAC products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-27110",
    "datePublished": "2024-05-14T17:16:39.659Z",
    "dateReserved": "2024-02-19T15:22:56.573Z",
    "dateUpdated": "2024-08-02T00:27:59.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27109 (GCVE-0-2024-27109)

Vulnerability from cvelistv5 – Published: 2024-05-14 17:13 – Updated: 2024-08-02 00:27
VLAI?
Title
Insufficiently protected credentials in GE HealthCare EchoPAC products
Summary
Insufficiently protected credentials in GE HealthCare EchoPAC products
CWE
  • CWE-522 - Insufficiently Protected Credentials
Assigner
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "image_vault",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_software",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_turnkey",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27109",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:31:48.782021Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:47:32.867Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:27:59.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Software Only",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206.44",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ImageVault",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Turnkey",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficiently protected credentials in GE HealthCare EchoPAC products"
            }
          ],
          "value": "Insufficiently protected credentials in GE HealthCare EchoPAC products"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-653",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-653 Use of Known Operating System Credentials"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-522",
              "description": "CWE-522 Insufficiently Protected Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T17:13:16.193Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Insufficiently protected credentials in GE HealthCare EchoPAC products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-27109",
    "datePublished": "2024-05-14T17:13:16.193Z",
    "dateReserved": "2024-02-19T15:22:56.573Z",
    "dateUpdated": "2024-08-02T00:27:59.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27108 (GCVE-0-2024-27108)

Vulnerability from cvelistv5 – Published: 2024-05-14 17:09 – Updated: 2024-08-02 00:27
VLAI?
Title
Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products
Summary
Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "image_vault",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_software",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_turnkey",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27108",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:31:41.993414Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:47:18.885Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:27:58.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Software Only",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ImageVault",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Turnkey",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products"
            }
          ],
          "value": "Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-122",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-122 Privilege Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T17:09:08.166Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-27108",
    "datePublished": "2024-05-14T17:09:08.166Z",
    "dateReserved": "2024-02-19T15:22:56.572Z",
    "dateUpdated": "2024-08-02T00:27:58.693Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27107 (GCVE-0-2024-27107)

Vulnerability from cvelistv5 – Published: 2024-05-14 17:05 – Updated: 2024-08-02 00:27
VLAI?
Title
Weak account password in GE HealthCare EchoPAC products
Summary
Weak account password in GE HealthCare EchoPAC products
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "image_vault",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_software",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_turnkey",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27107",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:31:36.437377Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:46:35.114Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:27:59.234Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Software Only",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206.82",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ImageVault",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Turnkey",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Weak account password in GE HealthCare EchoPAC products"
            }
          ],
          "value": "Weak account password in GE HealthCare EchoPAC products"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-70",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-70 Try Common or Default Usernames and Passwords"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T17:05:22.568Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Weak account password in GE HealthCare EchoPAC products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-27107",
    "datePublished": "2024-05-14T17:05:22.568Z",
    "dateReserved": "2024-02-19T15:22:56.572Z",
    "dateUpdated": "2024-08-02T00:27:59.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27106 (GCVE-0-2024-27106)

Vulnerability from cvelistv5 – Published: 2024-05-14 17:01 – Updated: 2024-08-02 00:27
VLAI?
Title
Vulnerable data in transit in GE HealthCare EchoPAC products
Summary
Vulnerable data in transit in GE HealthCare EchoPAC products
CWE
  • CWE-311 - Missing Encryption of Sensitive Data
Assigner
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:gehealthcare:image_vault:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "image_vault",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_software:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_software",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:echopac_turnkey:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "echopac_turnkey",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27106",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:31:29.049031Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:46:22.979Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:27:59.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Software Only",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ImageVault",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EchoPAC Turnkey",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vulnerable data in transit in GE HealthCare EchoPAC products"
            }
          ],
          "value": "Vulnerable data in transit in GE HealthCare EchoPAC products"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-157",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-157 Sniffing Attacks"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-311",
              "description": "CWE-311 Missing Encryption of Sensitive Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T17:01:22.488Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Vulnerable data in transit in GE HealthCare EchoPAC products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-27106",
    "datePublished": "2024-05-14T17:01:22.488Z",
    "dateReserved": "2024-02-19T15:22:56.572Z",
    "dateUpdated": "2024-08-02T00:27:59.190Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1630 (GCVE-0-2024-1630)

Vulnerability from cvelistv5 – Published: 2024-05-14 16:55 – Updated: 2024-08-22 17:51
VLAI?
Title
Path traversal vulnerability in “getAllFolderContents” function of Common Service Desktop, a GE HealthCare ultrasound device component
Summary
Path traversal vulnerability in “getAllFolderContents” function of Common Service Desktop, a GE HealthCare ultrasound device component
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
GE HealthCare Venue Affected: R1
Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Go Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Fit Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ e Affected: R7 , ≤ R9.1.4 (custom)
Affected: R8 , ≤ R10.1.3 (custom)
Affected: R9 , ≤ R11.0.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ He Affected: 0 , ≤ R9.3.1 (custom)
Create a notification for this product.
    GE HealthCare Vivid E Affected: E95 , < 206 (custom)
Affected: E90 , < 206 (custom)
Affected: E80 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid T Affected: T8 , < 206 (custom)
Affected: T9 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid iq Affected: 0 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Voluson Expert 16 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson Expert 18 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson Expert 22 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson SWIFT Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare LOGIQ E10 Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ E10s Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ Fortis Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:48:21.818Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "venue_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "r1"
              },
              {
                "status": "affected",
                "version": "r2"
              },
              {
                "lessThanOrEqual": "r3.3",
                "status": "affected",
                "version": "r3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "r4.3",
                "status": "affected",
                "version": "r4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_go_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "venue_go_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "r2"
              },
              {
                "lessThanOrEqual": "r3.3",
                "status": "affected",
                "version": "r3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "r4.3",
                "status": "affected",
                "version": "r4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_fit_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "venue_fit_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "r3.3",
                "status": "affected",
                "version": "r3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "r4.3",
                "status": "affected",
                "version": "r4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:logiq_e_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq_e_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "r9.1.4",
                "status": "affected",
                "version": "r7",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "r10.1.3",
                "status": "affected",
                "version": "r8",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "r11.0.3",
                "status": "affected",
                "version": "r9",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:logiq_he_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq_he_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "r9.3.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_e_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vivid_e_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "e95",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "e90",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "e80",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_t_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vivid_t_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "t8",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "t9",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_iq_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vivid_iq_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:voluson_expert_16:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "voluson_expert_16",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "0"
              },
              {
                "status": "affected",
                "version": "bt24"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:voluson_expert_18:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "voluson_expert_18",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "0"
              },
              {
                "status": "affected",
                "version": "bt24"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:voluson_expert_22:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "voluson_expert_22",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "0"
              },
              {
                "status": "affected",
                "version": "bt24"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:voluson_swift:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "voluson_swift",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "0"
              },
              {
                "status": "affected",
                "version": "bt24"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:logiq_e10:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq_e10",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "r3.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:logiq_e10s:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq_e10s",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "r3.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gehealthcare:logiq_fortis:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq_fortis",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "r3.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1630",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-14T19:43:01.721848Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-22T17:51:14.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Venue",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R1"
            },
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Go",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Fit",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ e",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.1.4",
              "status": "affected",
              "version": "R7",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R10.1.3",
              "status": "affected",
              "version": "R8",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R11.0.3",
              "status": "affected",
              "version": "R9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ He",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.3.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid E",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E95",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E90",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E80",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid T",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T8",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid iq",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 16",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 18",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 22",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson SWIFT",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10s",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ Fortis",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Path traversal vulnerability in \u201cgetAllFolderContents\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component"
            }
          ],
          "value": "Path traversal vulnerability in \u201cgetAllFolderContents\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T16:55:56.853Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Path traversal vulnerability in \u201cgetAllFolderContents\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-1630",
    "datePublished": "2024-05-14T16:55:56.853Z",
    "dateReserved": "2024-02-19T15:28:03.794Z",
    "dateUpdated": "2024-08-22T17:51:14.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1629 (GCVE-0-2024-1629)

Vulnerability from cvelistv5 – Published: 2024-05-14 16:32 – Updated: 2024-08-01 18:48
VLAI?
Title
Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component
Summary
Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
GE HealthCare Venue Affected: R1
Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Go Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Fit Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ e Affected: R7 , ≤ R9.1.4 (custom)
Affected: R8 , ≤ R10.1.3 (custom)
Affected: R9 , ≤ R11.0.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ He Affected: 0 , ≤ R9.3.1 (custom)
Create a notification for this product.
    GE HealthCare Vivid E Affected: E95 , < 206 (custom)
Affected: E90 , < 206 (custom)
Affected: E80 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid S Affected: 70N , < 206 (custom)
Affected: 60N , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid T Affected: T8 , < 206 (custom)
Affected: T9 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid iq Affected: 0 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Voluson Expert 16 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson Expert 18 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson Expert 22 Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Voluson SWIFT Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare LOGIQ E10 Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ E10s Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ Fortis Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-16T16:09:37.900864Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T18:01:09.761Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:48:21.479Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Venue",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R1"
            },
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Go",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Fit",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ e",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.1.4",
              "status": "affected",
              "version": "R7",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R10.1.3",
              "status": "affected",
              "version": "R8",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R11.0.3",
              "status": "affected",
              "version": "R9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ He",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.3.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid E",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E95",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E90",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E80",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid S",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "70N",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "60N",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid T",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T8",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid iq",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 16",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 18",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 22",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson SWIFT",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10s",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ Fortis",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Path traversal vulnerability in \u201cdeleteFiles\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component"
            }
          ],
          "value": "Path traversal vulnerability in \u201cdeleteFiles\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T16:32:43.530Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Path traversal vulnerability in \u201cdeleteFiles\u201d function of Common Service Desktop, a GE HealthCare ultrasound device component",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-1629",
    "datePublished": "2024-05-14T16:32:43.530Z",
    "dateReserved": "2024-02-19T15:23:21.436Z",
    "dateUpdated": "2024-08-01T18:48:21.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1628 (GCVE-0-2024-1628)

Vulnerability from cvelistv5 – Published: 2024-05-14 16:04 – Updated: 2024-08-01 18:48
VLAI?
Title
OS command injection vulnerabilities in GE HealthCare ultrasound devices
Summary
OS command injection vulnerabilities in GE HealthCare ultrasound devices
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Vendor Product Version
GE HealthCare Venue Affected: R1
Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Go Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare Venue Fit Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ e Affected: R7 , ≤ R9.1.4 (custom)
Affected: R8 , ≤ R10.1.3 (custom)
Affected: R9 , ≤ R11.0.3 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ He Affected: 0 , ≤ R9.3.1 (custom)
Create a notification for this product.
    GE HealthCare Vivid E Affected: E95 , < 206 (custom)
Affected: E90 , < 206 (custom)
Affected: E80 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid S Affected: 70N , < 206 (custom)
Affected: 60N , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid T Affected: T8 , < 206 (custom)
Affected: T9 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid iq Affected: 0 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Voluson Expert 16 Affected: 0
Affected: BT24 , < Ext1 (custom)
Create a notification for this product.
    GE HealthCare Voluson Expert 18 Affected: 0
Affected: BT24 , < Ext1 (custom)
Create a notification for this product.
    GE HealthCare Voluson Expert 22 Affected: 0
Affected: BT24 , < Ext1 (custom)
Create a notification for this product.
    GE HealthCare Voluson SWIFT Affected: 0
Affected: BT24
Create a notification for this product.
    GE HealthCare Invenia ABUS 2.0 Affected: 0 , ≤ 2.2.7 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ E10 Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ E10s Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ Fortis Affected: 0 , < R3.2.0 (custom)
Create a notification for this product.
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:ge_healthcare:venue:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "venue",
            "vendor": "ge_healthcare",
            "versions": [
              {
                "status": "affected",
                "version": "multiple versions"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ge_healthcare:vivid:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vivid",
            "vendor": "ge_healthcare",
            "versions": [
              {
                "status": "affected",
                "version": "multiple versions"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ge_healthcare:voluson:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "voluson",
            "vendor": "ge_healthcare",
            "versions": [
              {
                "status": "affected",
                "version": "multiple versions"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ge_healthcare:logiq:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "logiq",
            "vendor": "ge_healthcare",
            "versions": [
              {
                "status": "affected",
                "version": "multiple versions"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1628",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-16T16:10:00.517201Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T18:01:30.939Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:48:21.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Venue",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R1"
            },
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Go",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Fit",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.3",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ e",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.1.4",
              "status": "affected",
              "version": "R7",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R10.1.3",
              "status": "affected",
              "version": "R8",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R11.0.3",
              "status": "affected",
              "version": "R9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ He",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.3.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid E",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E95",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E90",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E80",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid S",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "70N",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "60N",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid T",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T8",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid iq",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 16",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "lessThan": "Ext1",
              "status": "affected",
              "version": "BT24",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 18",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "lessThan": "Ext1",
              "status": "affected",
              "version": "BT24",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson Expert 22",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "lessThan": "Ext1",
              "status": "affected",
              "version": "BT24",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Voluson SWIFT",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "0"
            },
            {
              "status": "affected",
              "version": "BT24"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Invenia ABUS 2.0",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "2.2.7",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ E10s",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ Fortis",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "R3.2.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "OS command injection vulnerabilities in GE HealthCare ultrasound devices"
            }
          ],
          "value": "OS command injection vulnerabilities in GE HealthCare ultrasound devices"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-6",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-6 Argument Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T16:04:57.780Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "OS command injection vulnerabilities in GE HealthCare ultrasound devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-1628",
    "datePublished": "2024-05-14T16:04:57.780Z",
    "dateReserved": "2024-02-19T15:23:20.113Z",
    "dateUpdated": "2024-08-01T18:48:21.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1486 (GCVE-0-2024-1486)

Vulnerability from cvelistv5 – Published: 2024-05-14 15:10 – Updated: 2024-08-16 18:15
VLAI?
Title
Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices
Summary
Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
GE HealthCare Venue Affected: R1
Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.2 (custom)
Create a notification for this product.
    GE HealthCare Venue Go Affected: R2
Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.2 (custom)
Create a notification for this product.
    GE HealthCare Venue Fit Affected: R3 , ≤ R3.3 (custom)
Affected: R4 , ≤ R4.2 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ e Affected: R7 , ≤ R9.1.4 (custom)
Affected: R8 , ≤ R10.1.3 (custom)
Affected: R9 , ≤ R11.0.2 (custom)
Create a notification for this product.
    GE HealthCare LOGIQ He Affected: 0 , ≤ R9.3.1 (custom)
Create a notification for this product.
    GE HealthCare Vivid E Affected: E95 , < 206 (custom)
Affected: E90 , < 206 (custom)
Affected: E80 , < 206 (custom)
Affected: E9 113.2 , ≤ 113.2 (custom)
Create a notification for this product.
    GE HealthCare Vivid S Affected: 70N , < 206 (custom)
Affected: 60N , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid T Affected: T8 , < 206 (custom)
Affected: T9 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Vivid iq Affected: 0 , < 206 (custom)
Create a notification for this product.
    GE HealthCare Invenia ABUS Affected: 1.2.3
Create a notification for this product.
    GE HealthCare Invenia ABUS 2.0 Affected: 0 , < 2.2.9 (custom)
Create a notification for this product.
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:40:21.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://securityupdate.gehealthcare.com/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "venue_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "R1"
              },
              {
                "status": "affected",
                "version": "R2"
              },
              {
                "lessThanOrEqual": "R3.3",
                "status": "affected",
                "version": "R3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "R4.2",
                "status": "affected",
                "version": "R4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_go_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "venue_go_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "R2"
              },
              {
                "lessThanOrEqual": "R3.3",
                "status": "affected",
                "version": "R3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "R4.2",
                "status": "affected",
                "version": "R4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:venue_fit_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "venue_fit_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "R3.3",
                "status": "affected",
                "version": "R3",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "R4.2",
                "status": "affected",
                "version": "R4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:logiq_e_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "logiq_e_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "R9.1.4",
                "status": "affected",
                "version": "R7",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "R10.1.3",
                "status": "affected",
                "version": "R8",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "R11.0.2",
                "status": "affected",
                "version": "R9",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:logiq_he_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "logiq_he_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThanOrEqual": "R9.3.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_e_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "vivid_e_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "E95",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "E90",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "E80",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "113.2",
                "status": "affected",
                "version": "E9 113.2",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "vivid_s_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "70N",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "60N",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_t_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "vivid_t_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "T8",
                "versionType": "custom"
              },
              {
                "lessThan": "206",
                "status": "affected",
                "version": "T9",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:vivid_iq_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "vivid_iq_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "206",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:invenia_abus_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "invenia_abus_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "status": "affected",
                "version": "1.2.3"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gehealthcare:invenia_abus_2.0_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "invenia_abus_2.0_firmware",
            "vendor": "gehealthcare",
            "versions": [
              {
                "lessThan": "2.2.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1486",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-12T14:08:59.014421Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T18:15:02.675Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Venue",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R1"
            },
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.2",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Go",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "R2"
            },
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.2",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Venue Fit",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R3.3",
              "status": "affected",
              "version": "R3",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R4.2",
              "status": "affected",
              "version": "R4",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ e",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.1.4",
              "status": "affected",
              "version": "R7",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R10.1.3",
              "status": "affected",
              "version": "R8",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R11.0.2",
              "status": "affected",
              "version": "R9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "LOGIQ He",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThanOrEqual": "R9.3.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid E",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E95",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E90",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "E80",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "113.2",
              "status": "affected",
              "version": "E9 113.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid S",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "70N",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "60N",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid T",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T8",
              "versionType": "custom"
            },
            {
              "lessThan": "206",
              "status": "affected",
              "version": "T9",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Vivid iq",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "206",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Invenia ABUS",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "status": "affected",
              "version": "1.2.3"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Invenia ABUS 2.0",
          "vendor": "GE HealthCare",
          "versions": [
            {
              "lessThan": "2.2.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices"
            }
          ],
          "value": "Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-14T15:10:22.262Z",
        "orgId": "171caf72-b841-4e04-a68e-93493aff2b94",
        "shortName": "GEHC"
      },
      "references": [
        {
          "url": "https://securityupdate.gehealthcare.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "171caf72-b841-4e04-a68e-93493aff2b94",
    "assignerShortName": "GEHC",
    "cveId": "CVE-2024-1486",
    "datePublished": "2024-05-14T15:10:22.262Z",
    "dateReserved": "2024-02-13T22:34:57.386Z",
    "dateUpdated": "2024-08-16T18:15:02.675Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14006 (GCVE-0-2017-14006)

Vulnerability from cvelistv5 – Published: 2018-03-20 16:00 – Updated: 2024-09-16 23:20
VLAI?
Summary
GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Severity ?
No CVSS data available.
CWE
  • CWE-287 - IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.
Assigner
References
Impacted products
Vendor Product Version
GE Healthcare GE Xeleris Affected: 1.0,1.1,2.1,3.0,3.1
Create a notification for this product.
Date Public ?
2018-03-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:13:41.557Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GE Xeleris",
          "vendor": "GE Healthcare",
          "versions": [
            {
              "status": "affected",
              "version": "1.0,1.1,2.1,3.0,3.1"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-20T15:57:01.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2017-14006",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GE Xeleris",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.0,1.1,2.1,3.0,3.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GE Healthcare"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2017-14006",
    "datePublished": "2018-03-20T16:00:00.000Z",
    "dateReserved": "2017-08-30T00:00:00.000Z",
    "dateUpdated": "2024-09-16T23:20:54.531Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14008 (GCVE-0-2017-14008)

Vulnerability from cvelistv5 – Published: 2018-03-20 16:00 – Updated: 2024-09-16 17:43
VLAI?
Summary
GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Severity ?
No CVSS data available.
CWE
  • CWE-287 - IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.
Assigner
References
Impacted products
Date Public ?
2018-03-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:13:41.648Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103400",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103400"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GE Centricity PACS RA1000",
          "vendor": "GE Healthcare",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-21T09:57:01.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103400",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103400"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2017-14008",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GE Centricity PACS RA1000",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GE Healthcare"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103400",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103400"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2017-14008",
    "datePublished": "2018-03-20T16:00:00.000Z",
    "dateReserved": "2017-08-30T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:43:31.891Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14004 (GCVE-0-2017-14004)

Vulnerability from cvelistv5 – Published: 2018-03-20 16:00 – Updated: 2024-09-16 17:27
VLAI?
Summary
GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Severity ?
No CVSS data available.
CWE
  • CWE-287 - IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.
Assigner
References
Date Public ?
2018-03-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:13:41.677Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GE GEMNet License server aka. (EchoServer)",
          "vendor": "GE Healthcare",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-20T15:57:01.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2017-14004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GE GEMNet License server aka. (EchoServer)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GE Healthcare"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2017-14004",
    "datePublished": "2018-03-20T16:00:00.000Z",
    "dateReserved": "2017-08-30T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:27:58.161Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-14002 (GCVE-0-2017-14002)

Vulnerability from cvelistv5 – Published: 2018-03-20 16:00 – Updated: 2024-09-17 02:52
VLAI?
Summary
GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Severity ?
No CVSS data available.
CWE
  • CWE-287 - IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.
Assigner
References
Impacted products
Date Public ?
2018-03-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:13:41.691Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103405",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103405"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GE Infinia",
          "vendor": "GE Healthcare",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-21T09:57:01.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103405",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103405"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2017-14002",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GE Infinia",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GE Healthcare"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER AUTHENTICATION CWE-287 The affected devices use default or hard-coded credentials."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103405",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103405"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2017-14002",
    "datePublished": "2018-03-20T16:00:00.000Z",
    "dateReserved": "2017-08-30T00:00:00.000Z",
    "dateUpdated": "2024-09-17T02:52:52.873Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}