Publication Date: 2021 July 2

Update Date:  2021 July 12


Philips is currently monitoring developments and updates related to the recent Microsoft alert, providing guidance for a Windows Print Spooler Remote Code Execution Vulnerability (CVE-2021-34527). We are aware of a public report, known as “PrintNightmare”. The vulnerability impacts computers running the Print Spooler service on Windows client and server versions starting with Windows 7 and higher.


According to Microsoft, the vulnerability can be exploited as an authenticated user calling RpcAddPrinterDriverEx(). An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.


As part of the company’s product security policy and protocols, Philips’ teams are evaluating Philips’ products and solutions utilizing Microsoft Operating Systems for potential impacts from this reported vulnerability and validating actions. Philips is also monitoring for OS updates related to this vulnerability and evaluating further possible actions as needed.


Philips is committed to ensuring the safety, security, integrity, and regulatory compliance of our products to be deployed and to operate within Philips approved product specifications. Therefore, in accordance with Philips policy and regulatory requirements, all changes of configuration or software to Philips’ products (including operating system security updates and patches) may be implemented only in accordance with Philips product-specific, verified & validated, authorized, and communicated customer procedures or field actions.


If a product does require operating system security updates, configuration changes, or other actions to be taken by our customer or by Philips Customer Services, product-specific service documentation is produced by Philips product teams and made available to Philips service delivery platforms such as the Philips InCenter Customer Portal. Once posted by Philips product teams, all these materials are accessible to contract-entitled customers, licensed representatives, and Philips Customer Service teams.


Contract-entitled customers may use Philips InCenter and are encouraged to request Philips InCenter access and reference product-specific information posted. If customers still have questions, all customers (contract-entitled or otherwise) are encouraged to contact their local service support team or regional product service support as appropriate for up to date information specific to their Philips’ products.


Begin Update A: 2021 July 12


Philips is providing the list below in order to better assist our customers in identifying any Philips’ products that could be vulnerable to CVE-2021-34527. However, the list below is not comprehensive and may be updated as necessary if more products are identified. It does not indicate the patch or device status.

ACSYS Gateway & ACSYS-ER (1)
IntelliSpace Breast
PIC iX (B.0x, C.0x)
IntelliSpace Cardiovascular (ISCV) (1)
Pinnacle 18.x
CDE (1)
IntelliSpace Critical Care and Anesthesia (ICCA)
RIS (1)
Data Warehouse Connect
IntelliSpace ECG  Management System (ECG) (1)
SensaVue HD and fMRI
Diagnostic Site Server (DSS) (5)
IntelliSpace Perinatal (OBTV) (1)
Dosewise Portal (1)
InteliSpace Portal Server (ISP) (1)
SPhAERA (3.x, 4.x, 5.x)
DynaCAD Breast and Prostate (1)
IntelliSpace Portal Workstation (1)
ST80i A.02 (1)
DynaSuite Neuro 3 (1)
IntelliVue Guardian Software (1)
eICU eCare Manager & eSearch (1)
IntelliVue XDS (1)
UroNav (1.x, 2.x, 3)
eTriage (1)
Vi-Pros (1)
e-Whiteboard (1)
Volcano ComboMap System
Forcare Suite (1) (3)
i-Report (1)
Volcano Core Imaging System
Holter Recorder DigiTrak XT (DTXT) (1)
Lung Cancer Screening (1)
Volcano Core Mobile Imaging System
Image Management (1)
Multi-Patient Bridge (MPB) (1)
VSS Dashboard (1)
InGent RIS (1)
Xper IM 1.5;2.x-5.x (1)
Intellibridge Enterprise (IBE) (1)
Performance Bridge (1)
Xcelera 4.1 (1)

(1)    Software only products with customer owned Operating Systems. For these products, Philips does not validate security patches, it is the customer responsibility to validate and deploy patches. 

(2)    Information or patch available in Incenter

(3)    Philips hosting business is in the process of validating and deploying the patch to the managed infrastructure 

(4)    In case of valid service level agreement, Philips is in the process of validating and deploying the patch on the Philips provided infrastructure.

(5)    Product is configured to automatically download patches



For customers who utilize the Philips Remote Services Network (RSN, PRS), all Philips RSN systems are protected against this vulnerability and customers are advised not to disconnect the PRS as it may impact Philips service teams from providing any required immediate and proactive support such as remote patching.


End Update A