A token is created using the username, current date/time, and a fixed AES-128 encryption key, which is the same across all installations.CreditsJoe Dillon reported these vulnerabilities to Philips.Referenceshttps://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-072-01https://www.philips.com/a-w/security/security-advisories.html