www.vitalimages.com Open in urlscan Pro
67.227.249.122  Public Scan

URL: https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/
Submission: On December 20 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.vitalimages.com/

<form role="search" method="get" id="searchform" class="searchform" action="https://www.vitalimages.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" value="" name="s" id="s" placeholder="Type Words Then Press Enter To Search">
    <input type="submit" id="searchsubmit" value="Search">
  </div>
</form>

Text Content

 * 
 * 
 * 
 * 

   
 * Careers
   
 * Contact Us
   
   
 * MyVitrea

Menu
 * About Us
   * News
   * Events & Trade Shows
   * Leadership
   * Community Involvement
   * Careers
   * Contact Us
 * Solutions
   * Enterprise Imaging Solutions
     * Vitrea® Connection
     * Vitrea® Vision
     * Vitrea® Intelligence
   * Clinical Applications
     * Advanced Visualization
     * Cardiovascular Imaging
     * Neurology Imaging
     * Oncology Imaging
     * Vascular/Interventional Imaging
     * Workflows
     * Additional Applications
     * CT Applications
     * MR Applications
     * XA Applications
     * Ultrasound Application
     * Olea Pulse
 * Resources
   * Customer Profiles
   * On-Demand Videos and Webinars
   * Articles
   * Clinical Case Reviews
   * eBooks
 * Education
 * Service & Support
   * Enterprise Imaging Consulting
   * Customer Support & Success
   * Product Lifecycle
   * Product Enhancement Request




SOFTWARE SECURITY
UPDATES


CVE-2022-38765 VITREA VIEW 7.X INDIRECT OBJECT ACCESS VULNERABILITY – SECURITY
ADVISORY

Published: December 9, 2022

An unscored (as of December 9, 2022) vulnerability, CVE-2022-38765, has been
identified in Vitrea View versions prior to 7.8 that have custom patient SSO
access enabled.

EXECUTIVE SUMMARY

In August 2022 a security researcher identified a vulnerability in a custom
patient SSO module for Vitrea View 7.7.6 where an authenticated patient could
retrieve information unrelated to their medical record. The exploit requires
valid credentials and the ability to modify and monitor “POST” variables.

This vulnerability was brought to Canon Medical’s attention in August 2022, and
a fix

was developed, tested, and applied in all affected systems within 48 hours.

 

Products that are not affected by this Vitrea View vulnerability:

 * Vitrea Advanced Visualization
 * Vitrea View 7.8 and above
 * Vitrea Read (formerly known as Easy Viz)
 * Vitrea Connection
 * Rialto products
 * Zillion products
 * Solution Health (Cloud and On-Prem)
 * Any Canon Medical modality

Products that are affected by CVE-2022-37461:

 * Vitrea View (versions < 7.8)

RESOLUTION

No further actions are required at this time to mitigate vulnerability
CVE-2022-38765. Canon Medical recommends that all customers run Vitrea View
behind a web application firewall and/or load balancer to provide additional
layers of security as part of a “defense in depth” or “zero trust security”
posture.

If you have any questions, please contact our support team.




CVE-2022-37461 VITREA VIEW 7.X CROSS-SITE SCRIPTING VULNERABILITIES – SECURITY
ADVISORY

Published: September 30, 2022

An unscored (as of September 30, 2022) vulnerability, CVE-2022-37461, has been
identified in Vitrea View versions prior to 7.7.6.

EXECUTIVE SUMMARY

This vulnerability has two methods of attack – a “pre-authorization” exploit and
a “post-authorization” exploit.  Both exploits involve attackers creating URLs
that point to vulnerable Vitrea View installations and which contain malicious
code, and the “post-authorization” exploit also requires convincing an
authenticated Vitrea View user to click on the malicious link.

This vulnerability was brought to Canon Medical’s attention as part of a routine
penetration test in a testing environment, was fixed, and was included in Vitrea
View 7.7.6, released April 29, 2022. No patient information was accessed or
exfiltrated.

Products that are not affected by this Vitrea View vulnerability:

 * Vitrea Advanced Visualization
 * Vitrea View 7.7.6 and above
 * Vitrea Read (formerly known as Easy Viz)
 * Vitrea Connection
 * Rialto products
 * Zillion products
 * Solution Health (Cloud and On-Prem)
 * Any Canon Medical modality

Products that are affected by CVE-2022-37461:

 * Vitrea View (versions < 7.7.6)

RESOLUTION

All customers currently running a version of Vitrea View 7.7.x prior to 7.7.6
should upgrade to the latest Vitrea View version.

Canon Medical recommends that all customers run Vitrea View behind a web
application firewall and/or load balancer to provide additional layers of
security as part of a “defense in depth” or “zero trust security” posture.

If you have any questions, please contact our support team.




SPRING FRAMEWORK "SPRINGSHELL" — SECURITY ADVISORY

Published: April 07, 2022

Executive Summary

A critical vulnerability, CVE-2022-22965, has been identified in Spring
Framework. This vulnerability is affecting the entire software industry,
including some Canon Medical Informatics products. Specific combinations of
Apache Tomcat and the Spring Boot executable are susceptible to a remote code
execution (RCE) vulnerability. A mitigation strategy is currently being
researched and developed.

Products that are not affected by SpringShell vulnerability:

 * Vitrea Advanced Visualization (all versions prior to 7.14.x)
 * Vitrea View
 * Solution Health (Cloud and On-Prem)
 * Easy Viz
 * Zillion products
 * Vitrea Connection
 * Rialto products

Products that are affected by SpringShell vulnerability:

 * Vitrea Advanced Visualization (7.15.x and 7.14.x)

Mitigation:

Options are still being explored to mitigate the issue with the affected
versions, this page will be updated as soon as a recommended mitigation is
available.

Our security and development teams continue to monitor this vulnerability as
additional industry information becomes available to maintain the safety and
effectiveness of our medical devices.


PLEASE MONITOR THIS WEBSITE FOR FUTURE UPDATES.

If you have any questions, please contact our support team.




CVE-2022-0778 - OPEN SSL INFINITE LOOP – SECURITY ADVISORY

Published: March 15, 2022

Updated: March 22, 2022

 

VULNERABILITY SUMMARY

The custodians of OpenSSL have shipped patches to resolve a high-severity
security flaw in its software library that could lead to a denial-of-service
(DoS) condition when parsing certificates.

Tracked as CVE-2022-0778 the issue stems from parsing a malformed certificate
with invalid explicit elliptic-curve parameters, resulting in what’s called an
“infinite loop.” The flaw resides in a function called BN_mod_sqrt() that’s used
to compute the modular square root.

 

REFERENCES AND SERVICES:

https://nvd.nist.gov/vuln/detail/CVE-2022-0778

https://www.openssl.org/news/secadv/20220315.txt

https://www.cisa.gov/uscert/ncas/current-activity/2022/03/17/openssl-releases-security-updates

 

RESOLUTION

Canon Medical recommends taking OpenSSL updates as they are made available.

Please use the references above to determine which update is applicable to your
OpenSSL deployment.

 

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact  Canon Medical Customer Success.




APACHE LOG4J SECURITY VULNERABILITIES - ZERO DAY – SECURITY ADVISORY

Published: December 12, 2021      Updated: March 1, 2022

Executive Summary

Critical vulnerabilities, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105,
CVE-2021-44832  have been identified in Apache Log4j, a popular Java based
logging framework. This vulnerability is affecting the entire software industry,
including some Canon Medical Informatics products. Apache Log4j 2.14.1 and below
are susceptible to a remote code execution vulnerability where a remote attacker
can take full control of a vulnerable machine. As such, it is critical to take
immediate actions to mitigate this vulnerability.

Products that are not affected by Apache Log4j vulnerability:

 * Vitrea View
 * Vitrea Advanced Visualization 6.x
 * Solution Health (Cloud)
 * Easy Viz
 * Zillion
 * Rialto Connect and Rialto Vault
 * Olea Sphere

– Applications integrated with Vitrea (iCAD, Invia, Medis, Mevis, Mirada, Olea
and Tomtec ) are not affected.

Products that are affected by Apache Log4j vulnerability:

 * Vitrea Advanced Visualization 7.x
 * Vitality XT server
 * Vitrea Connection 8.x
 * Rialto 7.x
 * Solution Health (On-Prem)
 * Vitrea DataStream

Recommended actions for mitigation:

External Network

 * Update firewall configurations to block outbound connections on the LDAP
   port. Please contact your IT department to update your firewall
   configurations. As an example, please see the following industry-recommended
   mitigation.
 * Patch the offending log4j libraries in affected products to remove the
   specific piece of code that enables the vulnerability.

Internal Network

 * For Vitrea Advanced Visualization version 7.6.x, 7.7.x, 7.8.x, 7.9.x, 7.10.x,
   7.11.x, 7.12.x, 7.14.x , 7.15.0, 7.15.1 products:
   Please follow this link to download the mitigation instructions:
   https://www.vitalimages.com/supportdownloads/AV-17122021A_CVE-2021-44228-E.zip

The latest update is a non-functional update. If your site has already ran a
previous version of this mitigation, running this latest version is unnecessary

NOTE* – If you ran the mitigation prior to this update, you will need to run
this updated/comprehensive script to mitigate CVE-2021-44832 vulnerability.

 * For Vitrea Connection 8.x , Rialto 7.x, Solution Health (On-Prem)
   products: Please contact customer support for assistance.

Our security and development teams continue to monitor this vulnerability as
additional industry information becomes available to maintain the safety and
effectiveness of our medical devices.


PLEASE MONITOR THIS WEBSITE FOR FUTURE UPDATES.

If you have any questions, please contact our support team.




MICROSOFT WINDOWS INSTALLER ELEVATION OF PRIVILEGE VULNERABILITY – SECURITY
ADVISORY

Update: Nov 9, 2021

Published: Nov 12, 2021

Microsoft continues to address this vulnerability involving the windows
installer elevation of privilege in Windows operating systems. Similarly to the
announcements in recent weeks, a new vulnerability has been discovered.
Microsoft has yet to patch this vulnerability.

VULNERABILITY SUMMARY

This vulnerability allows local attackers to escalate privileges on affected
installations of Microsoft Windows. An attacker must first obtain the ability to
execute low-privileged code on the target system in order to exploit this
vulnerability.

The specific flaw exists within the Windows Installer service. By creating a
junction, an attacker can abuse the service to delete a file or directory. An
attacker can leverage this vulnerability to escalate privileges and execute
arbitrary code in the context of SYSTEM. **

RELATED LINKS

Nov 23, 2021

MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1308/

MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41379

URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41379

https://blog.talosintelligence.com/2021/11/attackers-exploiting-zero-day.html

Please continue to monitor these Microsoft links for relevancy to your systems
and patch your systems as they become available.




MICROSOFT WINDOWS PRINT SPOOLER REMOTE CODE EXECUTION VULNERABILITY - ZERO DAY

Published: August 11, 2021

Microsoft continues to address multiple high severity vulnerabilities involving
the print spooler in most Windows operating systems. Similarly to the
announcements in recent weeks, a new vulnerability has been discovered.
Microsoft has yet to patch this vulnerability.

VULNERABILITY SUMMARY

A remote code execution vulnerability exists when the Windows Print Spooler
service improperly performs privileged file operations. An attacker who
successfully exploited this vulnerability could run arbitrary code with SYSTEM
privileges. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights.

Security patches have not been released as of the Patch Tuesday on August 10,
2021. Microsoft has provided a workaround within the link below.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36958

**

RELATING LINKS:

Jul 15, 2021
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481
https://support.microsoft.com/en-us/topic/kb5005652-manage-new-point-and-print-default-driver-installation-behavior-cve-2021-34481-873642bf-2634-49c5-a23b-6d8e9a302872

Please continue to monitor these Microsoft links for relevancy to your systems
and patch your systems as they become available.




MICROSOFT WINDOWS PRINT SPOOLER REMOTE CODE EXECUTION VULNERABILITY – SECURITY
ADVISORY

Update: August 13, 2021

Published: July 2, 2021

Microsoft has released a set of out-of-band updates to remediate these
vulnerabilities. These patches are available at the link referenced below.

NOTE: Several vulnerability watchdog publications are challenging the
comprehensive efficacy of the latest out-of-band updates released July 7, 2021
citing that similar high severity vulnerabilities remain outstanding. Microsoft
has yet to respond to these allegations at the time of this update.

Please continue to monitor Microsoft updates on this evolving issue and follow
the guidance as it becomes available.

VULNERABILITY SUMMARY

Microsoft has resolved the vulnerability called “PrintNightmare”, that affects
Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability.

This vulnerability affects all Vitrea products that are installed on Windows
server operating systems and Windows workstation operating systems.

Microsoft has now provided windows updates to resolve this issue. Please take
your windows updates accordingly.

REFERENCES AND SERVICES:

Windows Print Spooler Remote Code Execution Vulnerability

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

RESOLUTION

Canon Medical recommends taking Windows Updates as they are available and check
back to this page for updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




NVIDIA GPU DISPLAY DRIVER – SECURITY ADVISORY

Published: May 27, 2021

SUMMARY

NVIDIA has provided the following Security Announcement:

NVIDIA has released a software security update for NVIDIA GPU Display Driver.
This update addresses multiple issues that may lead to code execution, denial of
service, escalation of privileges, and information disclosure.

Specific driver update for vGPU and Quadro video cards is 452.96

To protect your system, download and install this software update through the
NVIDIA Driver Downloads Portal or, for the vGPU software update, through the
NVIDIA Licensing Portal.

Impact assessment and details on these high severity vulnerabilities are
available through the NVIDIA Security Advisory provided at the below.

REFERENCES AND SERVICES:

NVIDIA Security Advisory

https://nvidia.custhelp.com/app/answers/detail/a_id/5172

NVIDIA Driver Download Portal

https://www.nvidia.com/Download/index.aspx?lang=en-us

RESOLUTION

Canon Medical strongly recommends installing vendor patches and  security
updates as soon as possible.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




TOMTEC VULNERABILITY DISCLOSURE 2021-0001 – SECURITY ADVISORY

Published: May 17, 2021

VULNERABILITY SUMMARY

TOMTEC Imaging Systems GmbH has provided Canon Medical with a vulnerability
disclosure.

The TOMTEC-ARENA product is integrated with Vitrea and therefore may affect your
deployment if you have purchased TOMTEC-ARENA software.

Impact assessment and details on these vulnerabilities are available through the
TOMTEC Vulnerability Disclosure provided below.

REFERENCES AND SERVICES:

TOMTEC Vulnerability Disclosure Information 2021-0001

https://www.vitalimages.com/wp-content/uploads/Vulnerability-Disclosure-Form-2021-0001.pdf

RESOLUTION

Canon Medical recommends updating to the latest version of Vitrea that will
contain the TOMTEC-ARENA update once it has been released. Check to this page
for updated information.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




ADOBE FLASH PLAYER EOL AND REMOVAL – SECURITY ADVISORY

Published: January 13, 2021

Adobe stopped supporting Flash Player beginning December 31, 2020 (“EOL Date”),
as previously announced in July 2017. In addition, to help secure users’
systems, Adobe blocked Flash content from running in Flash Player beginning
January 12, 2021. Adobe strongly recommends all users immediately uninstall
Flash Player to help protect their systems.

For removal of Adobe Flash plugin from Microsoft Internet Explorer, you may
install the security patch by running Windows Update.

VULNERABILITY SUMMARY

Adobe Flash EOL

REFERENCES AND SERVICES:

Windows

Update for Removal of Adobe Flash Player for Windows can be found here KB4577586

Adobe

Standalone

https://www.adobe.com/products/flashplayer/end-of-life.html 

Enterprise

https://www.adobe.com/products/flashplayer/enterprise-end-of-life.html 

For general information on Flash Player’s EOL, please see Adobe’s general FAQ .

 

RESOLUTION

Canon Medical strongly recommends following this software removal guidance and
installing all security patches provided by Microsoft.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2020-10713 'BOOTHOLE' ATTACK IMPACTS WINDOWS AND LINUX SYSTEMS USING GRUB2
AND SECURE BOOT – INITIAL SECURITY ADVISORY

Published: July 29, 2020
Updated: September 10, 2020

VULNERABILITY SUMMARY

Eclypsium researchers have discovered a vulnerability — dubbed “BootHole” — in
the GRUB2 bootloader configuration file utilized by most Linux systems that can
be used to gain arbitrary code execution during the boot process, even when
Secure Boot is enabled. Attackers exploiting this vulnerability can install
persistent and stealthy bootkits or malicious bootloaders that could give them
near-total control over the victim device.

This configuration file is an external file commonly located in the EFI System
Partition and can therefore be modified by an attacker with administrator
privileges without altering the integrity of the signed vendor shim and GRUB2
boot loader executables. This could allow an authenticated, local attacker to
modify the contents of the GRUB2 configuration file to ensure that the
attacker’s chosen code is run before the operating system is loaded.

The vulnerability affects systems using Secure Boot, even if they are not using
GRUB2. Almost all signed versions of GRUB2 are vulnerable, meaning virtually
every Linux distribution is affected. In addition, GRUB2 supports other
operating systems, kernels and hypervisors. The problem also extends to any
Windows device that uses Secure Boot with the standard Microsoft Third Party
UEFI Certificate Authority. Thus the majority of laptops, desktops, servers and
workstations are affected.

Canon Medical is investigating this broad reaching vulnerability to define the
scope of products affected and to determine a list of vendors providing relevant
updates.

REFERENCES AND SERVICES:

System patching and mitigation guidance is provided by the following vendors:

HPE Servers:

HPE Security Bulletin:
https://www.hpe.com/us/en/services/security-vulnerability.html

Impact statement:
https://techhub.hpe.com/eginfolib/securityalerts/Boot_Hole/boot_hole.html

 * A number of items need updating that are listed within the Impact statement.
   Such as firmware updates for HPE Service Pack for ProLiant (SPP) and HPE
   Intelligent Provisioning.

Secure Boot DBX Updater for Windows and UEFI:
https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00105191en_us

HP Workstations:

HP Workstations Security Bulletin:
https://support.hp.com/us-en/document/c06655639

HP Workstations Security Bulletin: 
https://support.hp.com/us-en/document/c06707446

VMware:

VMware Bulletin: https://kb.vmware.com/s/article/80181

Dell Workstations:

Dell Security Bulletin:

https://www.dell.com/support/article/en-us/sln322283/dell-response-to-grub2-vulnerabilities-which-may-allow-secure-boot-bypass?lang=en

Additional Information:

https://www.dell.com/support/article/en-us/sln322287/additional-information-regarding-the-boothole-grub-vulnerability?lang=en

For more information and updates on the GRUB2 vulnerability, visit

NVD

https://nvd.nist.gov/vuln/detail/CVE-2020-10713

Carnegie Mellon

https://www.kb.cert.org/vuls/id/174059

RESOLUTION

Canon Medical recommends installing the applicable patches related to your
deployment as soon as possible.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2020-1472 - NETLOGON ELEVATION OF PRIVILEGE VULNERABILITY – CRITICAL
ADVISORY

Published: August 11, 2020

Microsoft Corporation has announced an elevation of privilege vulnerability that
exists when an attacker establishes a vulnerable Netlogon secure channel
connection to a domain controller, using the Netlogon Remote Protocol.

VULNERABILITY SUMMARY

CVE-2020-1472 is an elevation of privilege vulnerability that exsists in
Windows’ Netlogon. An unauthenticated user could use MS-NRPC to connect to a
domain controller as a domain administrator. An attacker who successfully
exploits the vulnerability can run a specially crafted application on a device
on the network.

Microsoft adds an important note to their advisory that this patch is the first
of two patches to fix this vulnerability. The second patch is slated to be
released in Q1 2021.

NOTE: Canon Medical is aware of this critical vulnerability and we are in the
process of testing our products in the context of the Phase 1 patch.

REFERENCES AND SERVICES:

Microsoft encourages administrators to review the following resource(s) and
apply the necessary patches to affected systems for Phase 1 of the update:

Microsoft CVE-2020-1472

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472

RESOLUTION
Canon Medical strongly recommends installing vendor patches and updates as soon
as possible.

Patches for all impacted versions can be found at the links in the References
section above.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




"RIPPLE 20" - TRECK IP STACK IMPLEMENTATIONS FOR EMBEDDED SYSTEMS ARE AFFECTED
BY MULTIPLE VULNERABILITIES – CRITICAL ADVISORY

Published: June 16, 2020

The Department of Homeland Security and CISA ICS-CERT issued a critical security
advisory warning covering multiple newly discovered vulnerabilities affecting
Internet-connected devices manufactured by multiple vendors.

VULNERABILITY SUMMARY

A networking stack is a software component that provides network connectivity
over the standard internet protocols. In this specific case these protocols
include ARP, IP (versions 4 and 6), ICMPv4, UDP and TCP communications
protocols. The Treck networking stack is used across a broad range of industries
(medical, government, academia, utilities, etc.), from a broad range of device
manufacturers – a fact which enhances their impact and scope, as each
manufacturer needs to push an update for their devices independently of all
others.

The impact of these vulnerabilities will vary due to the combination of build
and runtime options used while developing different embedded systems. This
diversity of implementations and the lack of supply chain visibility has
exasperated the problem of accurately assessing the impact of these
vulnerabilities. In summary, a remote, unauthenticated attacker may be able to
use specially-crafted network packets to cause a denial of service, disclose
information, or execute arbitrary code.

NOTE: This is a hardware-centric suite of vulnerabilities. The “Ripple20” is not
specific to Canon Medical software.

NOTE: Canon Medical has discovered that related vendor patching for this attack
vector has extended beyond the 19 vulnerabilities identified in the original
“Ripple 20” announcement by JSOF (see below).

REFERENCES AND SERVICES:

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and
users and administrators to review the following resources and apply the
necessary updates to affected systems:

JSOF’s original “Ripple 20” write up:

https://www.jsof-tech.com/ripple20/

Intel® CSME, SPS, TXE, AMT, ISM and DAL Advisory:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html

Workstations:

The vulnerabilities in the Intel product flow downhill to the HP Inc and Dell
workstations via the Intel Chipsets. Affected products can be found at the
following locations:

HP Inc:

https://support.hp.com/us-en/document/c06655639

Dell Inc:

https://www.dell.com/support/article/en-us/sln321836/dell-response-to-the-ripple20-vulnerabilities?lang=en

https://www.dell.com/support/article/en-us/sln321723/june-2020-intel-platform-update-ipu-2020-1-impact-on-dell-and-dell-emc-products?lang=en

https://www.dell.com/support/article/en-us/sln321727/dsa-2020-143-dell-client-platform-security-update-for-intel-platform-updates-2020-1?lang=en

 

Servers:

HPE:

https://techhub.hpe.com/eginfolib/securityalerts/Ripple20/Ripple20.html

HPE – ProLiant Gen10 iLO 5 vulnerabilities.

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us

No other hardware supported by Canon Medical has been determined affected.

 

RESOLUTION
Canon Medical strongly recommends installing the vendor patches and updates as
soon as possible.

Patches for all impacted versions can be found at the links in the References
section above.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




MICROSOFT GUIDANCE FOR DISABLING SMBV3 COMPRESSION "SMBGHOST"– MICROSOFT
SECURITY ADVISORY UPDATE

Published: March 11, 2020

Updated: March 12, 2020

Microsoft has released a security advisory ADV200005 and has published an update
that includes the affected software versions as well as an appropriate patch for
each.

Patches and affected software mapping can be found here CVE-2020-0796. You may
also install the patch by running Windows Update.

 

VULNERABILITY SUMMARY

Microsoft is aware of a remote code execution vulnerability in the way that the
Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests.
An attacker who successfully exploited the vulnerability could gain the ability
to execute code on the target SMB Server or SMB Client.

To exploit the vulnerability against an SMB Server, an unauthenticated attacker
could send a specially crafted packet to a targeted SMBv3 Server. To exploit the
vulnerability against an SMB Client, an unauthenticated attacker would need to
configure a malicious SMBv3 Server and convince a user to connect to it.

Microsoft will update its advisory listed above when further updates are
available.

REFERENCES

MITRE is tracking this vulnerability as CVE-2020-0796.

 

RESOLUTION

Canon Medical strongly recommends installing this patch as well as all security
patches provided by Microsoft.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




SCRIPTING ENGINE MEMORY CORRUPTION VULNERABILITY – MICROSOFT ZERO-DAY SECURITY
ADVISORY

Published: January 19, 2020

Microsoft has released a security advisory (ADV200001) that currently only
includes workarounds and mitigations that can be applied in order to safeguard
vulnerable systems from attacks. At the time of writing, there is no patch yet
available for this issue. Microsoft said it is working on a fix, to be released
at a later date.

While Microsoft said it was aware that the IE zero-day was being exploited in
the wild, the company described these as “limited targeted attacks,” suggesting
the zero-day was not broadly exploited, but rather that it was part of attacks
aimed at a small number of users. These limited IE zero-day attacks are believed
to be part of a larger hacking campaign, which also involves attacks against
Firefox users.

 

VULNERABILITY SUMMARY

A remote code execution (RCE) vulnerability exists in the way that the scripting
engine handles objects in memory in Internet Explorer. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. An attacker who successfully exploited the
vulnerability could gain the same user rights as the current user. If the
current user is logged on with administrative user rights, an attacker who
successfully exploited the vulnerability could take control of an affected
system. An attacker could then install programs; view, change, or delete data;
or create new accounts with full user rights.

In a web-based attack scenario, an attacker could host a specially crafted
website that is designed to exploit the vulnerability through Internet Explorer
and then convince a user to view the website, for example, by sending an email.

REFERENCES

This IE RCE zero-day is also tracked as CVE-2020-0674

RESOLUTION

While this vulnerability and its current Microsoft-provided workaround is not
anticipated to directly affect Canon Medical Products, deployments of said
products include the affected Internet Explorer file(s) listed in the advisory.
Corporations should follow their company policies when considering the
configuration mitigations provided in the Microsoft Advisory ADV200001 linked
above.

Canon Medical will continue to monitor announcements and progress regarding
future patching for this vulnerability and will distribute updated communication
as needed.

Canon Medical recommends installing the Microsoft Monthly Roll-up Updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




MULTIPLE REMOTE DESKTOP SERVER/CLIENT VULNERABILITIES – CISA ALERT

Published: January 14, 2020

Microsoft has released security updates to address multiple critical remote code
execution vulnerabilities, CVE-2020-0609, CVE-2020-0610 and CVE-2020-0611.

VULNERABILITY SUMMARIES


WINDOWS REMOTE DESKTOP SERVER VULNERABILITIES – CVE-2020-0609/CVE-2020-0610

A remote code execution vulnerability exists in Windows Remote Desktop Gateway
(RD Gateway) when an unauthenticated attacker connects to the target system
using RDP and sends specially crafted requests. This vulnerability is
pre-authentication and requires no user interaction. An attacker who
successfully exploited this vulnerability could execute arbitrary code on the
target system. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to send a specially
crafted request to the target systems RD Gateway via RDP.

The update addresses the vulnerability by correcting how RD Gateway handles
connection requests.

CVE-2020-0609/CVE-2020-0610:

 * Affects all supported Windows Server versions (Server 2012 and newer; support
   for Server 2008 ends January 14, 2020);
 * Occurs pre-authentication; and
 * Requires no user interaction to perform.

The Microsoft Security Advisories for CVE-2020-0609 and CVE-2020-0610 address
these vulnerabilities.


WINDOWS REMOTE DESKTOP CLIENT VULNERABILITY – CVE-2020-0611

A remote code execution vulnerability exists in the Windows Remote Desktop
Client when a user connects to a malicious server. An attacker who successfully
exploited this vulnerability could execute arbitrary code on the computer of the
connecting client. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to have control of a
server and then convince a user to connect to it. An attacker would need to
trick the user into connecting via social engineering, DNS poisoning or using a
Man in the Middle (MITM) technique. An attacker could also compromise a
legitimate server, host malicious code on it, and wait for the user to connect.

The update addresses the vulnerability by correcting how the Windows Remote
Desktop Client handles connection requests.

CVE-2020-0611:

 * Affects all supported Windows Server and Workstation versions (Support for
   Server 2008 and Windows 7 ends January 14, 2020)

The Microsoft Security Advisory for CVE-2020-0611 addresses this vulnerability.

 

RESOLUTION
Microsoft strongly recommends installing the Windows Updates as soon as
possible.

Patches for all impacted versions can be found at the specific CVE links in the
summary sections above.

Canon Medical recommends installing the Microsoft Monthly Roll-up Updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2019-13720 | USE-AFTER-FREE IN AUDIO – SECURITY BULLETIN

Published: October 31st, 2019

Google has released Chrome version 78.0.3904.87 for Windows, Mac, and Linux.
This version addresses vulnerabilities that an attacker could exploit to take
control of an affected system. One of these vulnerabilities (CVE-2019-13720) was
detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and
administrators to review the Chrome Release and apply the necessary updates.

VULNERABILITY SUMMARY:

Google is currently not publishing a summary of the vulnerability.

The following is an announcement from the link provided above:

“Access to bug details and links may be kept restricted until a majority of
users are updated with a fix. We will also retain restrictions if the bug exists
in a third party library that other projects similarly depend on, but haven’t
yet fixed.”

REFERENCES:

 * MITRE Advisory

RESOLUTION:
Canon Medical recommends checking  your Chrome browser Help->About Google Chrome
and confirming that you’re on the latest Chrome update 78.0.3904.87.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2019-1367 | INTERNET EXPLORER SCRIPTING ENGINE MEMORY CORRUPTION
VULNERABILITY – SECURITY BULLETIN

Published: September 23, 2019

Microsoft has released an out of band security updates to address a scripting
engine memory corruption vulnerability, CVE-2019-1367 for the following version
of Internet Explorer:

 * Internet Explorer 11

VULNERABILITY SUMMARY:

A remote code execution vulnerability exists in the way that the scripting
engine handles objects in memory in Internet Explorer. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. An attacker who successfully exploited the
vulnerability could gain the same user rights as the current user. If the
current user is logged on with administrative user rights, an attacker who
successfully exploited the vulnerability could take control of an affected
system. An attacker could then install programs; view, change, or delete data;
or create new accounts with full user rights.

In a web-based attack scenario, an attacker could host a specially crafted
website that is designed to exploit the vulnerability through Internet Explorer
and then convince a user to view the website, for example, by sending an email.

The security update addresses the vulnerability by modifying how the scripting
engine handles objects in memory.

REFERENCES:

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and
users and administrators to review the following resources and apply the
necessary updates:

 * Microsoft Security Vulnerability Information for  CVE-2019-1367

Other useful references:

 * MITRE Advisory
 * National Vulnerability Database

RESOLUTION:
Microsoft strongly recommends installing the Windows Update as soon as possible.

There is a vulnerability that is being actively exploited in the wild.

Canon Medical recommends installing the Microsoft patches as they are released.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2019-1181 AND CVE-2019-1182 | REMOTE DESKTOP SERVICES REMOTE CODE EXECUTION
VULNERABILITY – SECURITY BULLETIN

Published: August 14, 2019

Microsoft has released security updates to address two remote code execution
vulnerabilities, CVE-2019-1181 and CVE-2019-1182, in the following operating
systems:

 * Windows 7 SP1
 * Windows Server 2008 R2 SP1
 * Windows Server 2012
 * Windows 8.1
 * Windows Server 2012 R2
 * Windows 10

VULNERABILITY SUMMARY:

An attacker could exploit these vulnerabilities to take control of an affected
system. Similar to CVE-2019-0708 – dubbed BlueKeep and announced in June 2019 –
these vulnerabilities are considered “wormable” because malware exploiting these
vulnerabilities on a system could propagate to other vulnerable systems.

REFERENCES:

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and
users and administrators to review the following resources and apply the
necessary updates:

 * Microsoft Security Vulnerability Information for  CVE-2019-1181
 * Microsoft Security Vulnerability Information for CVE-2019-1182

Other useful references:

 * Microsoft Security Blog Post: Protect Against BlueKeep
 * Microsoft Customer Guidance for CVE-2019-0708
 * Microsoft Security Blog Post: Patch New Wormable Vulnerabilities in Remote
   Desktop Services (CVE-2019-1181/1182)

RESOLUTION:
Microsoft strongly recommends installing the Windows Update as soon as possible.

Both patches for all impacted versions can be found at the specific CVE links in
the References section above.

Canon Medical recommends installing the Microsoft Monthly Roll-up Updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




THE DICOM STANDARDS ORGANIZATION DICOM FILE PREAMBLE – SECURITY BULLETIN

Published: July 19, 2019

DICOM.org has reported the following Security Advisory:

VULNERABILITY SUMMARY

The DICOM Standards Organization has reported a data validation vulnerability in
the preamble defined by the DICOM File format. According to this report, the
vulnerability is exploitable by embedding executable code into the 128-byte
preamble. A malicious actor could modify a DICOM file preamble so that it is
treated as both an executable program and as a DICOM file. A user might be
somehow convinced to execute the file.

Note:

The DICOM Network Communications protocol between modalities, PACS, and display
systems does not transmit a preamble and is not subject to this vulnerability.

References:

DICOM FAQ Response to 128-byte preamble vulnerability

RESOLUTION

Review link provided above for details and vulnerability scenarios.

For Canon Medical customers, always exercise caution by reviewing or AV
(Antivirus)  scanning the contents of any portable media (CDs, USBs, etc.) to
determine that all files are legitimate DICOM files. Canon Medical recommends
that affected users reach out to their specific AV vendor to determine if their
solution properly scans for the affected file type. In the situation where an AV
solution cannot be installed, affected users should take steps to make sure that
they have processes and procedures in place to scan portable/removable media for
suspicious files before introducing the media into their medical networks.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




CVE-2019-0708 | REMOTE DESKTOP SERVICES REMOTE CODE EXECUTION VULNERABILITY –
SECURITY BULLETIN

Published: June 20, 2019

Microsoft® has provided the following Security Bulletin for the Remote Desktop
Services Remote Code Execution Vulnerability (a.k.a. BlueKeep) Vulnerability
CVE-2019-0708:

VULNERABILITY SUMMARY
A remote code execution vulnerability exists in Remote Desktop Services –
formerly known as Terminal Services – when an unauthenticated attacker connects
to the target system using RDP and sends specially crafted requests. This
vulnerability is pre-authentication and requires no user interaction. An
attacker who successfully exploited this vulnerability could execute arbitrary
code on the target system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to send a specially
crafted request to the target systems Remote Desktop Service via RDP.

The update addresses the vulnerability by correcting how Remote Desktop Services
handles connection requests.

References:

 * CVE-2019-0708 – From the National Vulnerability Database
 * CVE-2019-0708 – Microsoft Security Announcement

Only impacted versions are listed:

 * Windows 7 for X64-based Systems Service Pack 1 for Vitrea 6.x and Vitrea 7.x
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 for Vitrea 6.x

RESOLUTION
Microsoft strongly recommends taking the Windows Update as soon as possible.

The required patches for all impacted versions can be found here.

Canon Medical recommends taking the Microsoft Monthly Updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




HPE INTEGRATED LIGHTS-OUT 4 (ILO 4) FOR GEN9 SERVERS AND INTEGRATED LIGHTS-OUT 5
(ILO 5) FOR GEN10 SERVERS – SECURITY BULLETIN

Published: June 17, 2019

Hewlett Packard Enterprise has provided the following Security Bulletin:

VULNERABILITY SUMMARY
Vulnerabilities discovered in HPE Integrated Lights-Out 4 (iLO 4) for Gen9
servers and Integrated Lights-Out 5 (iLO 5) for Gen10 Servers could be exploited
remotely to allow Cross-Site Scripting (XSS), Unauthorized Data Injection, and
Buffer Overflow.

References:

 * CVE-2019-11982 – Cross-Site Scripting (XSS)
 * CVE-2019-11983 – Buffer overflow in CLI
 * CVE-2018-7117 – Cross-Site Scripting (XSS)

Only impacted versions are listed:

 * HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers 1.39 and earlier
 * HPE Integrated Lights-Out 4 (iLO 4) 2.61b and earlier

RESOLUTION
HPE has provided updated firmware for Integrated Lights-Out 4 (iLO 4) for Gen9
servers and Integrated Lights-Out 5 (iLO 5) for Gen10 to resolve these issues.

 * For iLO 4 (GEN 9), acquire firmware version 2.70 (or later) here and install
   it
 * For iLO 5 (GEN 10), acquire firmware version 1.40 (or later) here and install
   it

Hewlett Packard Enterprise strongly recommends the information in this Security
Bulletin should be acted upon as soon as possible.

Canon Medical recommends subscribing to the Hewlett Packard Enterprise Security
Bulletins for future security updates.

Disclaimer: When following any of the links provided you will be leaving Canon
Medical’s website. Canon Medical is not responsible for the content, security or
availability of linked sites.

If you have any questions, please contact Canon Medical Customer Success.




MICROARCHITECTURAL DATA SAMPLING (A.K.A. MDS, ZOMBIELOAD, RIDL & FALLOUT) -
SECURITY ADVISORY

Published: June 3, 2019

HPE has provided the following Security Announcement:

On May 14, 2019, Intel and other industry partners shared details and
information about a new group of vulnerabilities collectively called
Microarchitectural Data Sampling (MDS).  These security vulnerabilities in CPUs
may allow information disclosure. Intel is releasing microcode updates (MCU) to
mitigate these potential vulnerabilities. These are coupled with corresponding
updates to operating system and hypervisor software.

More details are available through CVE-2018-12126, CVE-2018-12127,
CVE-2018-12130, CVE-2019-11091, and the Intel Security Advisory.

Impact assessment for HPE Products is available here.

Additional details on HPE Support Center.

Disclaimer: If you follow the any of the links provided you will be leaving
Canon Medical’s website. Canon Medical is not responsible for the content,
security or availability of linked sites.

If you have any questions please contact Canon Medical Customer Success.




MICROSOFT® SECURITY UPDATE (OUT OF BAND)


CVE-2018-8653 | SCRIPTING ENGINE MEMORY CORRUPTION VULNERABILITY – CRITICAL

Published: December 19, 2018

A remote code execution vulnerability exists in the way that the scripting
engine handles objects in memory in Internet Explorer. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. An attacker who successfully exploited the
vulnerability could gain the same user rights as the current user. If the
current user is logged on with administrative user rights, an attacker who
successfully exploited the vulnerability could take control of an affected
system. An attacker could then install programs; view, change, or delete data;
or create new accounts with full user rights.

In a web-based attack scenario, an attacker could host a specially crafted
website that is designed to exploit the vulnerability through Internet Explorer
and then convince a user to view the website, for example, by sending an email.

The security update addresses the vulnerability by modifying how the scripting
engine handles objects in memory.

For more details and a full list of affected systems, click here:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8653

If you have any questions please contact Customer Success.




MICROSOFT® REMOTE DESKTOP SERVICES SECURITY UPDATE - POTENTIAL COMPATIBILITY
ISSUE

Published: June 4, 2018

Microsoft has recently released a security update for a vulnerability in Remote
Desktop Services(RDS). It has been reported that if two machines do not have the
same RDS patch install level, an incompatibility issue between them can prevent
log in.

This RDS update has been released through the standard Windows Update
distribution channels and will be installed to those machines taking the
standard monthly Windows Updates.

The RDS security update details are here:

CVE-2018-0886 | CREDSSP REMOTE CODE EXECUTION VULNERABILITY

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0886

Canon Medical strongly recommends installing these latest security patches
comprehensively to all product systems to avoid this issue.

If you have any questions, please contact Customer Success.




MICROSOFT® SECURITY UPDATE I CRITICAL


CVE-2018-8174 | WINDOWS VBSCRIPT ENGINE REMOTE CODE EXECUTION VULNERABILITY


CVE-2018-8120 | WIN32K ELEVATION OF PRIVILEGE VULNERABILITY

Published: May 8, 2018

Microsoft has announced and released its standard monthly security roll-up for
May 2018. In it are critical updates for two vulnerabilities that were
considered zero-day status until this release. These two specific
vulnerabilities are unique in that they are currently being exploited in the
wild. In addition, it is noteworthy that there are twenty-one (21) other
critical vulnerabilities remedied in this update. As a result, Canon Medical
strongly recommends to install these latest security patches to all product
systems as soon as possible.

At this time no Canon Medical customers have reported exploitations involving
these two vulnerabilities.

For more details and a full list of affected systems, click here:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8174

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120

If you have any questions please contact Customer Success.


MICROSOFT® SECURITY UPDATE (OUT OF BAND)


CVE-2018-1038 | WINDOWS KERNEL ELEVATION OF PRIVILEGE VULNERABILITY

Published: March 29, 2018

An elevation of privilege vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode. An attacker could then
install programs; view, change, or delete data; or create new accounts with full
user rights.

To exploit this vulnerability, an attacker would first have to log on to the
system. An attacker could then run a specially crafted application to take
control of an affected system.

The update addresses the vulnerability by correcting how the Windows kernel
handles objects in memory.

For more details and a full list of affected systems, click here:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038

If you have any questions please contact Customer Success.




ADOBE SECURITY ADVISORY APSA18-01

Published February 1, 2018

A critical vulnerability (CVE-2018-4878) exists in Adobe Flash Player 28.0.0.137
and earlier versions. Successful exploitation could potentially allow an
attacker to take control of the affected system.

Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild,
and is being used in limited, targeted attacks against Windows users. These
attacks leverage Office documents with embedded malicious Flash content
distributed via email.

A full summary containing current mitigations, affected products and plans for
patching can be accessed here:
https://helpx.adobe.com/security/products/flash-player/apsa18-01.html

Adobe will address this vulnerability in a release planned for the week of
February 5.

For the latest information, users may monitor the Adobe Product Security
Incident Response Team blog.

Please refer to this Software Security Updates page for the latest information
from Canon Medical and contact Customer Success if you have any questions.




CUSTOMER SUCCESS ALERT

MELTDOWN AND SPECTRE SIDE-CHANNEL VULNERABILITIES

The United States Computer Emergency Readiness Team (US-CERT), a division of the
Department of Homeland Security, has released the following alert regarding the
security vulnerabilities “Meltdown and Spectre.” The formal source for this
alert is hosted here: US-CERT: Meltdown and Spectre Side-Channel
Vulnerabilities.

> Original release date: January 03, 2018
> 
> “US-CERT is aware of a set of security vulnerabilities – known as Meltdown and
> Spectre – that affect modern computer processors. Exploitation of these
> vulnerabilities could allow an attacker to obtain access to sensitive
> information.
> 
> Users and administrators are encouraged to review Vulnerability Note
> VU#584653, Microsoft’s Advisory, and Mozilla’s blog post for additional
> information and refer to their OS vendor for appropriate patches.
> 
> US-CERT is not aware of any active exploitation at this time and will provide
> additional information as it becomes available.”

This is a broad-based set of vulnerabilities that requires security patching
from many contributors (e.g., hardware vendors, Microsoft, VMWare, etc.) for
complete remediation. The Intel chipsets that Canon Medical’s software runs upon
are directly affected by this finding.

US-CERT advises that the changes to accommodate/remediate this issue could
impact one or more of our applications. As patches become available, we will
test our applications in their context and provide our customers with any
specific cautions or additional instruction.

Please refer to this Software Security Updates page for the latest information
from Canon Medical and contact Customer Success if you have any questions.




MICROSOFT® SECURITY ADVISORY 4010323

DEPRECATION OF SHA-1 FOR SSL/TLS CERTIFICATES IN MICROSOFT EDGE AND INTERNET
EXPLORER 11

Published: May 9, 2017

Beginning May 9, 2017, Microsoft released updates to Microsoft Edge and Internet
Explorer 11 to block sites that are protected with a SHA-1 certificate from
loading and to display an invalid certificate warning. This change will only
impact SHA-1 certificates that chain to a root in the Microsoft Trusted Root
Program where the end-entity certificate or the issuing intermediate uses SHA-1.
Enterprise or self-signed SHA-1 certificates will not be impacted, although we
recommend that all customers quickly migrate to SHA-2 based certificates. For
more information, please see Windows Enforcement of SHA1 Certificates.

For more details and a full list of affected systems, click here:
https://technet.microsoft.com/en-us/library/security/4010323

If you have any questions please contact Customer Success.


MICROSOFT® SECURITY BULLETIN (MS17-010) - CRITICAL

Canon Medical strongly recommends installing the latest security updates from
Microsoft as soon as they are made available.

Canon Medical recommends applying MS17-010 to all your Vitrea platforms to
protect against the WannaCry malware.

 * VitreaAdvanced / Vitrea® Advanced Visualization
   * enterprise deployment
   * Vitrea Workstation or workstation deployment
   * Vitrea Extend or extend deployment
 * Vitrea View
 * Vitality XT

If you cannot download the Windows update the Workaround can also be found in
the link below to protect the system(s).

For more information see the Microsoft Security Bulletin MS17-010 – Critical. 
If you have any questions please contact Customer Success.




VITREA ADVANCED RUNNING VMWARE TOOLS



Version in NGC/C# Client Version in Tools Info Screen Result 9541 9.10.5 –
2981885 NOT RECOMMENDED 10240 10.0.0 – 3000743 NOT RECOMMENDED

Canon Medical recommends deploying a version of VMware Tools on Vitrea Advanced
servers that does not result in this behavior. The table below shows the
currently recommended versions.



Version in NGC/C# Client Version in Tools Info Screen Result 9536 9.10.0 –
2476743 OK 9537 9.10.1 – 2791197 OK 10245 10.0.5 – 3227872 OK


ADOBE® READER® FOR WINDOWS®

Adobe has released a critical security bulletin and related security updates for
Adobe Reader for Windows. Canon Medical recommends users update their product
installations to the latest versions.

 * Users of Adobe Reader XI (11.0.20) and earlier versions should update to
   version 11.0.21.
 * Users of Adobe Reader DC Classic (2015.006.30306) and earlier versions should
   update to version 2015.006.30352.

For more information, see the Adobe Security Bulletin released on January 10,
2017 and recently updated via CVE-2017-3124.

To upgrade Adobe Reader, downloads can be found here.

All third party marks are property of their respective owners and have
protection in the United States and/or other countries.





ADOBE® FLASH® FOR WINDOWS®

Adobe has released security updates for Adobe Flash for Windows. Canon Medical
recommends users who have installed Adobe Flash to view Help and Training videos
update their product installations to the latest versions. Canon Medical does
not distribute Adobe Flash but it can be used with the Canon Medical products.

 * Users of the Adobe Flash Player for Windows should update to Adobe Flash
   Player 18.0.0.209.


For more information, see the Adobe Security Bulletin released on July 14, 2015.
This vulnerability is also known as ActionScript 3 opaqueBackground and
BitmapData classes of Flash Player Exploitation CVE-2015-5122, CVE-2015-5123.

If you wish to upgrade Adobe Flash the latest update downloads can be
found here.


MICROSOFT® WINDOWS® UPDATE MS15-061 - KB3057839

Canon Medical uncovered an issue with the Microsoft Windows Update MS15-061 –
KB3057839 that was released on June 9, 2015. If this Microsoft Update is applied
to the Microsoft operating system, Vitrea® reports will be blacked out when
exported to a DICOM endpoint.

Canon Medical is working directly with Microsoft to resolve the problem.

This patch affects all versions of Vitrea deployments on Windows Server® 2003
R2, Windows Server 2008 R2, Windows Server 2012 R2, and Windows 7 SP1.

Removing this Microsoft update or preventing this update’s installation will
allow Vitrea reports to export as expected.



CANON MEDICAL SUPPORT

Please contact Canon Medical Customer Support with any questions or variations
experienced with this issue.



MICROSOFT TECHNICAL INFORMATION

Microsoft Security Bulletin MS15-061 – Important

MS15-061: Vulnerabilities in kernel-mode drivers could allow elevation of
privilege: June 9, 2015




MICROSOFT® 0 DAY PATCH

On April 26, 2014 Microsoft announced a high impact vulnerability that affects
Internet Explorer versions 6 through 11. This vulnerability could allow remote
code execution on any system that is using these versions of Internet Explorer.
On May 1, Microsoft released a patch that fixes this exposure.

Canon Medical has tested the patch to this vulnerability and confirmed that
installing the patch does not negatively impact any Vitrea® products.

Canon Medical strongly recommends that all organizations apply this patch as
soon as possible to all systems running any Vitrea software.

References:
Microsoft Security Advisory 2963983
– https://technet.microsoft.com/library/security/2963983
National Vulnerability Database
– http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1776


HEARTBLEED VIRUS

Canon Medical has tested our Vitrea® software and confirmed that we are not
affected by the Heartbleed virus.

If you have any questions on either of these issues, please call Canon Medical
Customer Support at support@mi.medical.canon or 800.208.3005.


Microsoft®, Windows® and Microsoft Windows Server® are registered trademarks of
Microsoft Corporation.

Adobe®, Flash® and Reader® are registered trademarks of Adobe Systems
Incorporated.

Canon Medical is a trademark of Canon Medical Informatics, Inc. Marks not owned
by Canon Medical are the property of their respective holders.





CUSTOMER SUPPORT RESOURCES

 * Customer Success
 * Software Security Updates
 * Product Lifecycle
 * Product Enhancement Request
 * Compliance Documents
 * Remote Access


PROUD PARTNERS OF CHIME FOUNDATION






LATEST TWEETS

PACS have often been the foundation of medical imaging. Organizations that would
like to change their PACS have an… https://t.co/rl2iHEZ0Rp 4 months ago
Read More
Accessing patient image data in real-time, from anywhere, on any device is one
of the leading challenges facing hea… https://t.co/BGnD1HCgpJ 4 months ago
Read More
Our team is excited to be back at #HIMSSAPAC. Come see the latest innovations
from Canon Medical in Booth 119. https://t.co/Qsslza2FSz 3 months ago
Read More
Canon Across America is in Minneapolis today! This is a unique opportunity to
see our technologies with a hands-on… https://t.co/7QQ9EkXob3 3 months ago
Read More
“We needed someone who could grow with us, who had flexibility, who had the
technical infrastructure to help us, so… https://t.co/hkM8EPEv5t 4 months ago
Read More
The VNA’s inherently modular capabilities enable the decomposition, rather than
the deconstruction, of the departme… https://t.co/V4WVjBlsny 4 months ago
Read More
PACS have often been the foundation of medical imaging. Organizations that would
like to change their PACS have an… https://t.co/rl2iHEZ0Rp 4 months ago
Read More
Accessing patient image data in real-time, from anywhere, on any device is one
of the leading challenges facing hea… https://t.co/BGnD1HCgpJ 4 months ago
Read More
Our team is excited to be back at #HIMSSAPAC. Come see the latest innovations
from Canon Medical in Booth 119. https://t.co/Qsslza2FSz 3 months ago
Read More
Canon Across America is in Minneapolis today! This is a unique opportunity to
see our technologies with a hands-on… https://t.co/7QQ9EkXob3 3 months ago
Read More


CONNECT WITH US





HomeContact UsMyVitreaPrivacy Policy and Terms of UseEthics and Compliance

This website uses cookies and tracking technologies to assist with your
navigation, analyze use of our website and products and services, and assist
with our marketing efforts. See our Terms of Use and Privacy Policy. Click here
to view and adjust your cookie settings.

Vitrea is registered in the U.S. and may have protection in other countries.
Marks not owned by Canon Medical Informatics, Inc. are the property of their
respective holders.

This website contains general information about our products sold worldwide.
Product and product feature availability varies by country. For product
availability in your country, please contact your Sales Representative.

2022 © Canon Medical Informatics, Inc. - All Rights Reserved.


SCHEDULE A MEETING




GET FULL ACCESS TO ALL EXCLUSIVE CONTENT

Complete the form below and verify your email address to unlock the content


Search for:




PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.


BACK BUTTON PERFORMANCE COOKIES



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices


Our site uses essential cookies, which are necessary for the site to function
properly. By clicking “Accept All Cookies”, you agree to the use of other types
of cookies as well which enhance site navigation, analyze site usage, and assist
in our marketing efforts. For more information, please read ourPrivacy Policy

Accept Cookies
Cookies Settings