Philips IntelliVue WLAN
Philips IntelliVue WLAN modules (Version A and Version B) contain vulnerabilities (CWE-259 hardcoded credentials, CWE-494 unsigned firmware) that allow an attacker with wireless network access to corrupt the WLAN firmware. The module lacks proper validation of firmware updates or integrity checks, allowing successful exploitation without prior authentication. Successful exploitation causes the WLAN module to become inoperative, triggering an "inoperative condition" alert at both the bedside monitor and the Central Station, preventing wireless transmission of vital signs data. Affected products are IntelliVue MX800/700/600 (WLAN Version B, Firmware A.01.09), IntelliVue MP2/X2 (WLAN Version B, Firmware A.01.09), IntelliVue MP5/5SC (WLAN Version A, Firmware A.03.09), and IntelliVue MP20-MP90 (WLAN Version A, Firmware A.03.09).
- Wireless network access to the facility network where monitors are deployed
- WLAN module must be Version A (firmware A.03.09) or Version B (firmware A.01.09)
- High privileges on the WLAN module required to initiate firmware corruption (administrator or engineering access)
- Wireless network authentication (WPA2) may be present, but module does not validate firmware updates
- Physical proximity to wireless network or network route to affected monitors
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ebd19524-e10c-4e83-b235-f8dc352c21a3