Philips Clinical Collaboration Platform, Versions 12.2.1 and prior, does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Solution:
A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsma-20-261-01 | us government resource third party advisory |
https://www.philips.com/a-w/security/security-advisories/product-security-2020.html#2020_archive |