Multiple Vulnerabilities Discovered In Philips Tasy EMR Solution

numerous security vulnerabilities exist in the Philips Tasy EMR healthcare informatics solution. Exploiting these bugs could expose sensitive PHI data to an adversary alongside leading to system crashes.

CISA Warns For Philips Tasy EMR Vulnerabilities

The US Cybersecurity & Infrastructure Security Agency (CISA) has recently issued an alert for all healthcare vendors. This alert mentions two severe vulnerabilities in Philips EMR that the vendor reported to CISA itself.

Specifically, Philips confirmed SQL injection vulnerabilities in its Tasy EMR solution. Tasy EMR is a dedicated healthcare informatics solution currently in use by different healthcare facilities.

These bugs include CVE-2021-39375 – an SQL injection via WAdvancedFilter/getDimensionItemsByCode FilterValue parameter, and CVE-2021-39376 – SQL injection via CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter.

According to the details in CISA’s advisory, exploiting the vulnerabilities could directly expose the sensitive patients’ information to the attackers. Moreover, such malicious exploitation could also lead to denial of service.

Successful exploitation of these vulnerabilities could result in patient’s confidential data being exposed or extracted from Tasy’s database, give unauthorized access, or create a denial-of-service condition.

Both the vulnerabilities have received a CVSS score of 8.8. This third-party advisory also elaborates on the two vulnerabilities alongside the PoC.

The bugs primarily affect Philips Tasy EMR HTML5 3.06.1803 and earlier versions.

Following the discovery of these bugs, Philips patched both the issues with the release of Philips Tasy EMR HTML5 3.06.1804.

Since the patches are out, all healthcare facilities and hospitals must update their devices to receive the bug fixes. Given the severity of the threats and the vulnerability of the healthcare sector, addressing such issues at early stages is crucial to ensure patients’ data security.

Alongside getting the updates, CISA also recommends additional steps to alleviate the risks associated with the potential exploitation of these bugs. These measures include pulling the sensitive systems offline, isolating networks via firewalls, and using VPNs during remote access.

Let us know your thoughts in the comments.

Related posts

Apple Addressed Two Zero-Day Flaws In Intel-based Macs

Really Simple Security Plugin Flaw Risks 4+ Million WordPress Websites

Glove Stealer Emerges A New Malware Threat For Browsers

1 comment

Fatuara November 22, 2021 - 8:27 am
to good to be very true to be truth s truth

Comments are closed.

Add Comment