Critical Infrastructure Sectors: Healthcare and Public Health
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
philips patient information center ix c.02 |
||
philips patient information center ix c.03 |
||
philips efficia_cm_firmware 4.0 |
||
philips efficia_cm_firmware |