Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-2230

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-13 Mar, 2025 | 18:14
Updated At-17 Mar, 2025 | 20:05
Rejected At-
Credits

Philips Intellispace Cardiovascular (ISCV) Improper Authentication

A flaw exists in the Windows login flow where an AuthContext token can be exploited for replay attacks and authentication bypass.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:13 Mar, 2025 | 18:14
Updated At:17 Mar, 2025 | 20:05
Rejected At:
▼CVE Numbering Authority (CNA)
Philips Intellispace Cardiovascular (ISCV) Improper Authentication

A flaw exists in the Windows login flow where an AuthContext token can be exploited for replay attacks and authentication bypass.

Affected Products
Vendor
PhilipsPhilips
Product
Intellispace Cardiovascular (ISCV)
Default Status
unaffected
Versions
Affected
  • From 0 through 5.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-287CWE-287 Improper Authentication
Type: CWE
CWE ID: CWE-287
Description: CWE-287 Improper Authentication
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
4.08.5HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Philips recommends the following mitigations: * Resolved in ISCV 5.2, which was released in September 2020. * Philips recommends users upgrade ISCV installed base to the latest ISCV version (at the time of this publication is 830089 – IntelliSpace Cardiovacular 8.0.0.0) * Please contact a local Philips sales (service) representative to learn how to engage this upgrade process. * For managed services users, new releases will be made available upon resource availability. Releases are subject to country-specific regulations. Refer to the Philips advisory https://www.philips.com/a-w/security/security-advisories.html for more details.

Configurations

Workarounds

Exploits

Credits

finder
Joe Dillon reported these vulnerabilities to Philips.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-072-01
N/A
https://www.philips.com/a-w/security/security-advisories.html
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-072-01
Resource: N/A
Hyperlink: https://www.philips.com/a-w/security/security-advisories.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:13 Mar, 2025 | 19:15
Updated At:13 Mar, 2025 | 19:15

A flaw exists in the Windows login flow where an AuthContext token can be exploited for replay attacks and authentication bypass.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.5HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.17.7HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-287Primaryics-cert@hq.dhs.gov
CWE ID: CWE-287
Type: Primary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-072-01ics-cert@hq.dhs.gov
N/A
https://www.philips.com/a-w/security/security-advisories.htmlics-cert@hq.dhs.gov
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-072-01
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://www.philips.com/a-w/security/security-advisories.html
Source: ics-cert@hq.dhs.gov
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found