Philips Intellispace Cardiovascular (ISCV) Vulnerabilities Found

By Daniel Lopez

Philips Intellispace Cardiovascular (ISCV) is a well-known provider of multi-modality data and image management solutions to HIPAA-compliant healthcare companies. Two high-severity vulnerabilities were discovered to have affected ISCV version 4.1 and ISCV version 5.1, including prior versions of these models. The vulnerabilities having an assigned CVSS v4 severity score of 8.5 and CVSS v3.1 severity score of 7.7 are caused by inappropriate authentication and using weak passwords. A threat actor can use the vulnerabilities to play back the session of a logged-in user and access patient files, including protected health information.

Vulnerability CVE-2025-2230 is a result of improper authentication. The Windows access flow is affected by a vulnerability where an AuthContext token may be used to play back attacks and bypass authentication. Vulnerability CVE-2025-2229 is associated with weak credentials, where a token is made using the username, present date/time, and an AES-128 encryption key, which is identical in all installs.

The vulnerabilities were fixed in prior versions of ISCV, but healthcare companies will be vulnerable when using older software versions. CVE-2025-2230 was fixed in ISCV 4.2 build 20589, which was released in May 2019. CVE-2025-2229 was fixed in ISCV 5.2, which was released in September 2020. Phillips advises switching the ISCV setup base to the more recent version, which is 830089 – IntelliSpace Cardiovascular 8.0.0.0. ISCV users ought to examine their unit to determine the installed version and get in touch with a Philips sales consultant to know how to start the upgrade procedure.

Besides upgrading to the latest version, users must make sure that the solution is not connected to the Internet, has a firewall set up, and is cut off from business systems. In case remote access is needed, a safe access method ought to be available, for instance, a virtual private network (VPN).

Image credit: create, AdobeStock

Twitter Facebook LinkedIn Reddit Link copied to clipboard

Posted by

Daniel Lopez

Daniel Lopez is the HIPAA trainer behind HIPAA Coach and the HIPAA subject matter expert for NetSec.news. Daniel has over 10 years experience as a HIPAA coach. Daniel provides his HIPAA expertise on several publications including Healthcare IT Journal and The HIPAA Guide. Daniel has studied Health Information Management before focusing his career on HIPAA compliance and protecting patient privacy. You can follow Daniel on Twitter / X https://twitter.com/DanielLHIPAA