CVE-2017-9656
📋 TL;DR
This vulnerability in Philips DoseWise Portal allows attackers with system access to discover hard-coded database credentials, potentially gaining full control over the medical database containing protected health information (PHI). It affects healthcare organizations using vulnerable versions of the DoseWise Portal application.
💻 Affected Systems
- Philips DoseWise Portal
📦 What is this software?
Dosewise by Philips
Dosewise by Philips
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the medical database containing PHI, allowing unauthorized access, modification, or deletion of sensitive patient data, potentially affecting patient care and violating HIPAA regulations.
Likely Case
Unauthorized access to PHI by internal actors or attackers who have gained initial access to the system, leading to data breaches and regulatory violations.
If Mitigated
Limited impact due to proper network segmentation, access controls, and monitoring preventing attackers from reaching the backend system files containing credentials.
🎯 Exploit Status
Exploitation requires elevated privileges to access backend system files first, then using discovered credentials to access the database.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.1.7.333 and 2.1.1.3069
Vendor Advisory: http://www.philips.com/productsecurity
Restart Required: Yes
Instructions:
1. Contact Philips support for updated versions. 2. Apply the security update provided by Philips. 3. Restart the DoseWise Portal application and verify functionality.
🔧 Temporary Workarounds
Restrict Access to Backend Systems
allImplement strict access controls to prevent unauthorized users from accessing the web application backend system files.
Network Segmentation
allIsolate the DoseWise Portal database server from other network segments to limit attack surface.
🧯 If You Can't Patch
- Implement strict least-privilege access controls to the DoseWise Portal system
- Monitor database access logs for unusual activity and implement database activity monitoring
🔍 How to Verify
Check if Vulnerable:
Check the DoseWise Portal version in the application interface or configuration files. If version is 1.1.7.333 or 2.1.1.3069, the system is vulnerable.
Check Version:
Check application interface or consult Philips documentation for version verification method
Verify Fix Applied:
Verify the application version has been updated to a version later than the vulnerable releases and test database connectivity with new credentials.
📡 Detection & Monitoring
Log Indicators:
- Unusual database access patterns
- Failed authentication attempts followed by successful access
- Access to backend configuration files
Network Indicators:
- Unexpected database connections from unauthorized systems
- Database traffic from web application servers to unusual destinations
SIEM Query:
source="dosewise" AND (event_type="database_access" OR file_access="*config*" OR file_access="*credential*")