Philips Brilliance Computed Tomography (CT) System (Update A)
Multiple privilege escalation and hard-coded credential vulnerabilities exist in Philips Brilliance CT systems. Successful exploitation allows an attacker with local access to gain elevated privileges and access unauthorized system resources, including patient health information, system files, directories, and configuration settings. Vulnerabilities affect confidentiality, integrity, and availability of the imaging system. Philips has remediated hard-coded credentials in Brilliance iCT 4.x and later versions through credential management capabilities accessible via the Philips InCenter. The MX8000 Dual EXP has been unsupported since 2017; Philips recommends replacement. No other patches are currently available for earlier Brilliance CT models.
- Local access to the CT system console or local network segment
- No credentials required for initial access (hard-coded credentials present)
- Direct interaction with the operating system or network services on the affected CT device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cad10286-4948-41fc-8ff7-e204365d2ff9