Heimdal Security Blog

XSS Vulnerabilities in Canon Medical’s Vitrea View Could Disclose Patient Data

A new report published by Trustwave Spiderlabs’ team of researchers reveals two reflected cross-site scriptings (XSS) vulnerabilities in Canon Medical’s Vitrea View third-party software, found during a penetration test. The two vulnerabilities are known collectively as CVE-2022-37461.

The Vitrea View tool enables viewing and safely exchanging medical images via the DICOM standard.

Source

What Data Is at Risk?

An attacker can exploit the flaws to gain access to/modify patient information (such as stored images and scans) and gain additional access to some Vitrea View services.

If exploited an attacker could access patient information and obtain additional access to various services associated with Vitrea View.

Source

As explained by Security Affairs, the two problems that could lead to an XSS Attack are:

Once an authenticated admin is coerced into visiting the affected URL, it is possible to create and modify the Python, JavaScript and Groovy scripts used by the Vitrea View application.

Source

Additionally, a proof of concept for each vulnerability was released by the experts.

To address the two vulnerabilities, Canon Medical released Vitrea View version 7.7.6.

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.