First published: Thu Mar 13 2025(Updated: )
A flaw exists in the Windows login flow where an AuthContext token can be exploited for replay attacks and authentication bypass.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Philips IntelliSpace Cardiovascular |
Philips recommends the following mitigations: * Resolved in ISCV 5.2, which was released in September 2020. * Philips recommends users upgrade ISCV installed base to the latest ISCV version (at the time of this publication is 830089 – IntelliSpace Cardiovacular 8.0.0.0) * Please contact a local Philips sales (service) representative to learn how to engage this upgrade process. * For managed services users, new releases will be made available upon resource availability. Releases are subject to country-specific regulations. Refer to the Philips advisory https://www.philips.com/a-w/security/security-advisories.html for more details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2230 has a high severity rating due to its potential for exploitation through replay attacks and authentication bypass.
To fix CVE-2025-2230, apply the latest security patch provided by Philips for the Intellispace Cardiovascular software.
The impacts of CVE-2025-2230 include unauthorized access to systems and sensitive data due to the authentication bypass vulnerability.
As of now, there have been reports indicating that CVE-2025-2230 is being targeted by attackers for exploitation.
Organizations using Philips Intellispace Cardiovascular software are specifically affected by CVE-2025-2230.