Publication Date: 14 September 2020 

Update Date: 20 November 2020 

 

Philips is currently monitoring developments and updates related to the recent Microsoft alert concerning escalation of privilege vulnerability (CVE-2020-1472) in Microsoft’s Netlogon. As reported by Microsoft, an elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
 

As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from these reported vulnerabilities and validating actions. Philips is also monitoring for OS updates related to these vulnerabilities and evaluating further possible actions as needed.

 

Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. Philips is currently in the process of evaluating the Microsoft patch and vendor recommended mitigation options. According to Microsoft, to exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.


Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.

 

If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation will be produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all of these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams.

 

Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise)  are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.

Begin Update C: 20 November 2020
 

Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1472. However, the list below is not comprehensive and may be updated as necessary if more products are identified.

Clinical Collaboration Platform officially registered as Vue PACS****
Illumeo 2.0**
IntelliBridge Enterprise (IBE) B.08-B.12**
IntelliSpace ECG Management System B.00 (IECG)*
Intellispace PACS (4.4, 5.5x)***
IntelliSpace Discovery 2.0**
IntelliSpace Portal Server (9.0, 10.0)**
UDM (1.1, 2.2)
XIRIS (8.2, 8.3)

*Software only products with customer owned Operating Systems.

**Information or patch available in Incenter.

***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure.

**** Only those installs with Veritas Cluster Manager Software installed. 

 

Note: 
For customers who utilize the Remote Services Network (RSN, PRS), all Philips RSN systems are fully protected against this vulnerability and customers are advised not to disconnect the PRS as it may impact Philips service teams from providing any required immediate and proactive support such as remote patching.
 

Philips is continuing to assess the Microsoft patch for Philips’ products and services that use remote desktop services. Philips will use Incenter as the communication mechanism for necessary mitigation or remediation. 

 

End Update B

 

Begin Update B: 29 October 2020
 

Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1472. However, the list below is not comprehensive and may be updated as necessary if more products are identified.

Clinical Collaboration Platform officially registered as Vue PACS****
Illumeo 2.0**
IntelliSpace ECG Management System B.00 (IECG)*
Intellispace PACS (4.4, 5.5x)***
IntelliSpace Discovery 2.0**
IntelliSpace Portal Server (9.0, 10.0)**
UDM (1.1, 2.2)
XIRIS (8.2, 8.3)

*Software only products with customer owned Operating Systems.

**Information or patch available in Incenter.

***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure.

**** Only those installs with Veritas Cluster Manager Software installed.

 

Note: 
For customers who utilize the Remote Services Network (RSN, PRS), all Philips RSN systems are fully protected against this vulnerability and customers are advised not to disconnect the PRS as it may impact Philips service teams from providing any required immediate and proactive support such as remote patching.
 

Philips is continuing to assess the Microsoft patch for Philips’ products and services that use remote desktop services. Philips will use Incenter as the communication mechanism for necessary mitigation or remediation.

 

End Update B

 

Begin Update A: 5 October 2020
 

Philips is providing the list below in order to better assist our customers in identifying any Philips’ products vulnerable to CVE-2020-1472. However, the list below is not comprehensive and may be 

Clinical Collaboration Platform officially registered as Vue PACS****
Illumeo 2.0**
IntelliSpace ECG Management System B.00 (IECG)*
Intellispace PACS (4.4, 5.5x)***
IntelliSpace Discovery 2.0**
IntelliSpace Portal Server (9.0, 10.0)**
UDM (1.1, 2.2)
XIRIS (8.2, 8.3)

updated as necessary if more products are identified. 

 

*Software only products with customer owned Operating Systems.

**Information or patch available in Incenter.

***Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure.

**** Only those installs with Veritas Cluster Manager Software installed.

 

End Update A