Tom in Tech Support Tidbit:

A common question from Siemens MI-SPECT users is how can they determine if their system is up-to-date with with Microsoft security patches.  For systems running Windows XP or Windows 7, running the patch_check Visual Basic script determines whether all the Siemens-approved patches have been installed.  Be advised that each version of Microsoft Windows has a separate script.

NOTE:  Most computers are configured to run Visual Basic Scripts by simply double-clicking on the script; however, some computers are not.  If you attempt to run the patch_check script on a system and a pop-up appears requesting, “Choose the program you want to use to open this file,” then browse and select C:\WINDOWS\system32\wscript.exe (Windows Script executable).

For obvious reason, it is imperative that any workstation running Microsoft Windows is up-to-date with security patches, also know as hotfixes.  To ensure a hotfix does not impair its imaging capabilities, Siemens MI-SPECT Engineering tests and then approves hotfixes prior to authorizing their installation on a customer’s system.

WARNING:  Do not install any hotfix that was not approved by Siemens MI-SPECT Engineering.

NOTE:  The following only applies to Siemens MI-SPECT workstations other than a CCAM, ICS, IRS, DRS and SNAC.

WINDOWS 10

On systems running Windows 10, most hotfixes are installed via updates to the OS Build.  To check the OS Build and Revision, run the Windows winver command.

IMPORTANT NOTE:

Microsoft released hotfix MS17-010 to prevent a WannaCry ransomware attack.  That patch is included on Windows 10 OS Build 14393.693 and later.   Siemens MI-SPECT Windows 10 workstations are running OS Build 14393.2724 (dated January 8, 2019) or later.  Consequently, Siemens Windows 10 workstations are patched to prevent a WannaCry ransomware attack.

Likewise, Microsoft released hotfix MS15-035 to prevent a so-called Homeland Security attack.  That patch is also included on Windows 10 OS Build 14393.693 and later.   Siemens MI-SPECT Windows 10 workstations are running OS Build 14393.2724 (dated January 8, 2019) or later.  Consequently, Siemens Windows 10 workstations are patched to prevent a Homeland Security attack

As of July 2023, Siemens has not released any standalone hotfixes for systems running Windows 10.  The list of installed Microsoft hotfixes can be displayed by opening a command prompt and running the systeminfo command.

Systems running VB22 UD06 have the following Microsoft updates.

  • KB4054590

  • KB4054855

  • KB4132216

  • KB4465659

  • KB4520724

  • KB4576750

  • KB4577586

  • KB4589210

  • KB5017396

  • KB5023788

  • KB5026363

WINDOWS 7 Service Pack 1

As of August 2022, Siemens has released the following groups of patches for systems running Windows 7 Service Pack 1.  Running the visual basic script ( WIN7_SP1_patch_check ) will test whether each patch is installed.  FYI, right-click and download the script to a Jump Drive and then run the script on the MI-SPECT workstation.

IMPORTANT NOTES:

MI-403-17-S, MI-404-17-S and MI-405-17-S are updates to prevent a WannaCry ransomware attack.  However, only one of these updates should be installed, based upon the type of workstation and software version as described below.

  • MI-403-17-S is for viewing and processing stations (including Symbia.Net) running software version VB20.  It is not for acquisition workstations.

  • MI-404-17- S is for acquisition workstations on E.CAM and Symbia systems, Intevo systems, Evo systems, and Evo Excel systems running VB10 or VB20 software.  MI-404-17-S should not be installed on a Symbia.net, because it will cause the Server to cease to function.

  • MI=405-17-S is for viewing and processing stations (along with Symbia.Net) running VB10.

Be advised that Patch Check does not test whether MI-405-17-S is installed, because that update is not a Microsoft security patch.  Instead, that Siemens update disables SMB Server and SMB Client as a workaround to installing MS17-10 KB4012212 for WannaCry.  SMB is Microsoft Server Message Block, which is a method used to implement WannaCry ransomware. 

2015 MI-SPECT Windows 7 Hotfixes

   [-] MI-401-15-R

     (no download)

     (was removed and then divided into 402, 403 and 404)

   [-] MI-402-15-R

   [-] MI-403-15-R

   [-] MI-404-15-R

2016 MI-SPECT Windows 7 Hotfixes

   [-] MI401-16-R

   [-] MI402-16-R

2017 MI-SPECT Windows 7 Hotfixes 

   [-] MI-401-17-R

     (no download)

     (not a Windows 7 hotfix)

   [-] MI-402-17-R

     (no download)

     (not a Windows 7 hotfix)

   [-] MI-403-17-S

     (requires VB20 software)

     (for processing and viewing stations, including Symbia.net)

     (Do not install on acquisition stations)

   [-] MI-404-17-S

     (requires VB10 or VB20 software)

     (for acquisition stations)

     (Do not install on processing and viewing stations)

     (Do not install on Symbia.net)

   [-] MI-405-17-S

     (requires VB10 software)

     (Do not install on a anything other then processing and viewing stations, including Symbia.net Server)

   [-] MI-406-17-R   

     (no download)

     (does not exist)

   [-] MI-407-17-R 

     (no download)

     (does not exist)

   [-] MI-408-17-R

     (requires System Management is installed & activated)

WINDOWS XP Service Pack 3

As of this writing, Siemens has released the following groups of patches for systems running Windows XP Service Pack 3.  Running the visual basic script ( WINXP_SP3_patch_check ) will test whether each patch is installed for Windows XP SP3.   FYI, right-click and download the script to a Jump Drive and then run the script on the MI-SPECT workstation.

IMPORTANT NOTES:

MI-401-17-S and MI-402-17-S are updates to prevent a WannaCry ransomware attack.  However, only one of these updates should be installed, based upon the type of workstation and software version as described below.

  • MI-401-17-S is only for Symbia.Net systems running software version VA10.

  • MI=402-17-S is for E.CAM and E.Soft workstations running software version VA46 and Symbia Systems and E.soft workstations running software version VA60).  This patch is not approved for any prior software versions.  Systems running VA70 must be upgraded to VB10.

2011 MI SPECT Windows XP SP3 Hotfixes

   [-] MI-401-11-R

     (no download)

     (replaced by 402)

   [-] MI-402-11-R

2012 MI SPECT Windows XP SP3 Hotfixes

   [-] MI-401-12-R

2013 MI SPECT Windows XP SP3 Hotfixes

   [-] MI-401-13-R

2014 MI SPECT Windows XP SP3 Hotfixes

   [-] MI-401-14-R

2017 MI SPECT Windows XP SP3 Hotfixes

   [-] MI-401-17-S

     (contains KB4012598, the wannacry patch for Windows XP SP3)

     (only for Symbia.Net systems running software version VA10)

   [-] MI-402-17-S

     (contains KB4012598, the wannacry patch for Windows XP SP3)

     (for E.CAM and E.Soft workstations running software version VA46)

     (for Symbia Systems and E.soft workstations running software version VA60)

     (this patch is not approved for any prior software versions)

     (systems running VA70 must be upgraded to VB10)

   [-] MI-407-17-S

WINDOWS XP Service Pack 2

As of August 2022, Siemens has released the following groups of patches for systems running Windows XP Service Pack 2.  Running the visual basic script ( WINXP_SP2_patch_check ) will test whether each patch is installed for Windows XP SP2.   FYI, right-click and download the script to a Jump Drive and then run the script on the MI-SPECT workstation.

2007 MI SPECT Windows XP SP2 Hotfixes

   [-] MI-015-07

2008 MI SPECT Windows XP SP2 Hotfixes

   [-] MI-401-08

   [-] MI-402-08

   [-] MI-403-08

   [-] MI-404-08

   [-] MI-405-08

   [-] MI-406-08

   [-] MI-407-08

     (no download)

     (does not exist)

   [-] MI-408-08

2009 MI SPECT Windows XP SP2 Hotfixes

  [-] MI-401-09

  [-] MI-402-09

     (no download)

     (does not exist)

  [-] MI-403-09

  [-] MI-404-09

  [-] MI-405-09

     (no download)

     (does not exist)

  [-] MI-406-09

Disclaimer:  This is not an official Siemens Healthineers website.

All comments, recommendations and suggestions are the personal opinion of Tom in Tech Support.