Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Interventional Workspot", "vendor": "Philips", "versions": [{"status": "affected", "version": "Release 1.3.2"}, {"status": "affected", "version": "Release 1.4.0"}, {"status": "affected", "version": "Release 1.4.1"}, {"status": "affected", "version": "Release 1.4.3"}, {"status": "affected", "version": "Release 1.4.5"}]}, {"defaultStatus": "unaffected", "product": "Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live", "vendor": "Philips", "versions": [{"status": "affected", "version": "Release 1.0"}]}, {"defaultStatus": "unaffected", "product": "ViewForum", "vendor": "Philips", "versions": [{"status": "affected", "version": "Release 6.3V1L10"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10). The software constructs all or part of an OS command using externally influenced input from an upstream component but does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when sent to a downstream component.</p>"}], "value": "Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10). The software constructs all or part of an OS command using externally influenced input from an upstream component but does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when sent to a downstream component."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert", "dateUpdated": "2025-06-04T19:46:39.186Z"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-21-019-01"}, {"url": "https://www.philips.com/a-w/security/security-advisories/product-security-2021.html#2021_archive"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Philips has released a software patch to proactively address this \nvulnerability in the installed base and will schedule service activities\n with impacted users to implement the correction. As a mitigation for \nthis vulnerability, users with expertise are advised to change the IPMI \npassword for the workstation interface.</p>\n<p>Users with questions regarding specific Philips Interventional \nWorkspot and/or installations and correction eligibility should contact a\n <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.usa.philips.com/healthcare/solutions/customer-service-solutions\">Philips service support team, regional service support</a></p><p>, or call 1-800-722-9377 with reference to field change order (FCO) number 2019-IGTBST-014.</p>\n<p>Please see the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.philips.com/productsecurity\">Philips product security website</a></p> for the Philips advisory and the latest security information for Philips products.\n\n<br>"}], "value": "Philips has released a software patch to proactively address this \nvulnerability in the installed base and will schedule service activities\n with impacted users to implement the correction. As a mitigation for \nthis vulnerability, users with expertise are advised to change the IPMI \npassword for the workstation interface.\n\n\nUsers with questions regarding specific Philips Interventional \nWorkspot and/or installations and correction eligibility should contact a\n Philips service support team, regional service support https://www.usa.philips.com/healthcare/solutions/customer-service-solutions \n\n, or call 1-800-722-9377 with reference to field change order (FCO) number 2019-IGTBST-014.\n\n\nPlease see the Philips product security website https://www.philips.com/productsecurity \n\n for the Philips advisory and the latest security information for Philips products."}], "source": {"advisory": "ICSMA-21-019-01", "discovery": "INTERNAL"}, "title": "Philips Interventional Workstations OS Command Injection", "x_generator": {"engine": "Vulnogram 0.2.0"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-27298", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Philips Interventional WorkSpot, Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live, ViewForum", "version": {"version_data": [{"version_value": "Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10)."}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Philips Interventional Workspot (Release 1.3.2, 1.4.0, 1.4.1, 1.4.3, 1.4.5), Coronary Tools/Dynamic Coronary Roadmap/Stentboost Live (Release 1.0), ViewForum (Release 6.3V1L10). The software constructs all or part of an OS command using externally influenced input from an upstream component but does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when sent to a downstream component."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78"}]}]}, "references": {"reference_data": [{"name": "https://us-cert.cisa.gov/ics/advisories/icsma-21-019-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-019-01"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T16:11:36.582Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://us-cert.cisa.gov/ics/advisories/icsma-21-019-01"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27298", "datePublished": "2021-01-20T19:27:22", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2025-06-04T19:46:39.186Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}