First published: Mon Apr 07 2025(Updated: )
We observed that Intellispace Portal binaries doesn’t have any protection mechanisms to prevent reverse engineering. Specifically, the app’s code is not obfuscated, and no measures are in place to protect against decompilation, disassembly, or debugging. As a result, attackers can reverse-engineer the application to gain insights into its internal workings, which can potentially lead to the discovery of sensitive information, business logic flaws, and other vulnerabilities. Utilizing this flaw, the attacker was able to identify the Hardcoded credentials from PortalUsersDatabase.dll, which contains .NET remoting definition. Inside the namespace PortalUsersDatabase, the class Users contains the functions CreateAdmin and CreateService that are used to initialize accounts in the Portal service. Both CreateAdmin and CreateService functions contain a hardcoded encrypted password along with its respective salt that are set with the function SetInitialPasswordAndSalt. This issue affects IntelliSpace Portal: 12 and prior; Advanced Visualization Workspace: 15.
Credit: 20705f08-db8b-4497-8f94-7eea62317651
Affected Software | Affected Version | How to fix |
---|---|---|
Philips IntelliSpace Portal | <12 | |
Philips Advanced Visualization Workspace | <15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3426 is categorized as a high severity vulnerability due to the lack of protections against reverse engineering.
To mitigate CVE-2025-3426, implement code obfuscation and establish protections against decompilation and debugging in your applications.
CVE-2025-3426 affects Philips IntelliSpace Portal up to version 12 and Philips Advanced Visualization Workspace up to version 15.
The primary risk of CVE-2025-3426 is that attackers can easily reverse engineer the software, potentially exposing sensitive data or intellectual property.
As of now, there is no official patch available for CVE-2025-3426, so implementing recommended mitigations is crucial.