CVE-2024-1863: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Sante PACS Server
CVE-2024-1863 is a critical SQL Injection vulnerability in Sante PACS Server version 3. 3. 3, specifically in the token endpoint processing HTTP requests on port 3000. The flaw allows remote attackers to execute arbitrary code without authentication by injecting malicious SQL commands via the token parameter. Exploitation results in code execution under the NETWORK SERVICE context, impacting confidentiality, integrity, and availability. No user interaction or privileges are required, making this vulnerability highly exploitable. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 8 underscores the urgency for remediation. Organizations using Sante PACS Server should prioritize patching or applying mitigations immediately to prevent potential compromise. Healthcare providers and entities relying on PACS systems are particularly at risk due to the sensitive nature of medical imaging data handled by this product.
AI Analysis
Technical Summary
CVE-2024-1863 identifies a critical SQL Injection vulnerability (CWE-89) in Sante PACS Server version 3.3.3. The vulnerability resides in the token endpoint, which listens on port 3000 and processes HTTP requests containing a token parameter. The server fails to properly sanitize or neutralize special characters in this parameter before incorporating it into SQL queries. This improper input validation allows an unauthenticated remote attacker to inject arbitrary SQL commands, leading to remote code execution within the context of the NETWORK SERVICE account. The vulnerability was reported by ZDI (ZDI-CAN-21539) and has a CVSS v3.0 base score of 9.8, indicating critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. The vulnerability enables attackers to compromise the PACS server, potentially accessing or manipulating sensitive medical imaging data, disrupting services, or using the server as a foothold for further network intrusion. No official patches or mitigations are listed yet, increasing the urgency for defensive measures. The vulnerability affects a widely used healthcare imaging server product, which is integral to medical workflows, making exploitation highly impactful.
Potential Impact
The impact of CVE-2024-1863 is severe for organizations using Sante PACS Server, particularly healthcare providers and medical facilities. Exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise. This can result in unauthorized access to sensitive patient imaging data, alteration or deletion of medical records, disruption of critical healthcare services, and potential lateral movement within the network. Given the NETWORK SERVICE context of execution, attackers may escalate privileges or deploy ransomware and other malware. The breach of confidentiality and integrity of medical data can have serious regulatory and reputational consequences. Additionally, availability impacts could disrupt diagnostic workflows, delaying patient care. The vulnerability's ease of exploitation and critical severity make it a high-risk threat that could be leveraged by cybercriminals or nation-state actors targeting healthcare infrastructure.
Mitigation Recommendations
1. Immediate mitigation involves isolating the affected Sante PACS Server from untrusted networks and restricting access to port 3000 to trusted internal hosts only. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the token parameter. 3. Monitor network traffic and server logs for unusual or suspicious requests to the token endpoint. 4. Employ network segmentation to limit the server’s access to sensitive backend systems and reduce lateral movement risk. 5. If possible, disable or restrict the token endpoint functionality until a vendor patch is available. 6. Engage with Sante support to obtain official patches or updates addressing this vulnerability. 7. Conduct a thorough security audit of the PACS server environment to identify any signs of compromise. 8. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 9. Consider deploying application-layer input validation and parameterized queries in custom integrations or proxies as an additional safeguard. 10. Maintain up-to-date backups of critical data to enable recovery in case of exploitation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Italy, Spain
CVE-2024-1863: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Sante PACS Server
Description
CVE-2024-1863 is a critical SQL Injection vulnerability in Sante PACS Server version 3. 3. 3, specifically in the token endpoint processing HTTP requests on port 3000. The flaw allows remote attackers to execute arbitrary code without authentication by injecting malicious SQL commands via the token parameter. Exploitation results in code execution under the NETWORK SERVICE context, impacting confidentiality, integrity, and availability. No user interaction or privileges are required, making this vulnerability highly exploitable. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 8 underscores the urgency for remediation. Organizations using Sante PACS Server should prioritize patching or applying mitigations immediately to prevent potential compromise. Healthcare providers and entities relying on PACS systems are particularly at risk due to the sensitive nature of medical imaging data handled by this product.
AI-Powered Analysis
Technical Analysis
CVE-2024-1863 identifies a critical SQL Injection vulnerability (CWE-89) in Sante PACS Server version 3.3.3. The vulnerability resides in the token endpoint, which listens on port 3000 and processes HTTP requests containing a token parameter. The server fails to properly sanitize or neutralize special characters in this parameter before incorporating it into SQL queries. This improper input validation allows an unauthenticated remote attacker to inject arbitrary SQL commands, leading to remote code execution within the context of the NETWORK SERVICE account. The vulnerability was reported by ZDI (ZDI-CAN-21539) and has a CVSS v3.0 base score of 9.8, indicating critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. The vulnerability enables attackers to compromise the PACS server, potentially accessing or manipulating sensitive medical imaging data, disrupting services, or using the server as a foothold for further network intrusion. No official patches or mitigations are listed yet, increasing the urgency for defensive measures. The vulnerability affects a widely used healthcare imaging server product, which is integral to medical workflows, making exploitation highly impactful.
Potential Impact
The impact of CVE-2024-1863 is severe for organizations using Sante PACS Server, particularly healthcare providers and medical facilities. Exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise. This can result in unauthorized access to sensitive patient imaging data, alteration or deletion of medical records, disruption of critical healthcare services, and potential lateral movement within the network. Given the NETWORK SERVICE context of execution, attackers may escalate privileges or deploy ransomware and other malware. The breach of confidentiality and integrity of medical data can have serious regulatory and reputational consequences. Additionally, availability impacts could disrupt diagnostic workflows, delaying patient care. The vulnerability's ease of exploitation and critical severity make it a high-risk threat that could be leveraged by cybercriminals or nation-state actors targeting healthcare infrastructure.
Mitigation Recommendations
1. Immediate mitigation involves isolating the affected Sante PACS Server from untrusted networks and restricting access to port 3000 to trusted internal hosts only. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the token parameter. 3. Monitor network traffic and server logs for unusual or suspicious requests to the token endpoint. 4. Employ network segmentation to limit the server’s access to sensitive backend systems and reduce lateral movement risk. 5. If possible, disable or restrict the token endpoint functionality until a vendor patch is available. 6. Engage with Sante support to obtain official patches or updates addressing this vulnerability. 7. Conduct a thorough security audit of the PACS server environment to identify any signs of compromise. 8. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 9. Consider deploying application-layer input validation and parameterized queries in custom integrations or proxies as an additional safeguard. 10. Maintain up-to-date backups of critical data to enable recovery in case of exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-02-23T19:39:00.991Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6d42b7ef31ef0b56f782
Added to database: 2/25/2026, 9:44:34 PM
Last enriched: 2/26/2026, 9:57:53 AM
Last updated: 2/26/2026, 11:16:53 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighTrend Micro Patches Critical Apex One Vulnerabilities
CriticalCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.