Philips Alice 6 Vulnerabilities (Update B)
Philips Alice 6 versions R8.0.3 and prior contain insufficient encryption and lack cryptographic integrity checks. These weaknesses allow an attacker to intercept and decrypt usernames, passwords, and personal data transmitted by or stored on the system. An attacker could also replace a trusted system node with a malicious one to alter, corrupt, or disclose sensitive data. The vulnerabilities stem from weak cryptographic implementation (CWE-287: Improper Authentication, CWE-311: Missing Encryption of Sensitive Data).
- Network access to Alice 6 system communications
- No authentication required to perform passive interception
- Physical or network access to replace a trusted node on the network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/efa633b9-b438-4491-a058-a4a464adea15Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.