Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11671: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer

0
Medium
VulnerabilityCVE-2025-11671cvecve-2025-11671cwe-306
Published: Mon Oct 13 2025 (10/13/2025, 07:30:20 UTC)
Source: CVE Database V5
Vendor/Project: EBM Technologies
Product: Uniweb/SoliPACS WebServer

Description

Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain information such as account names and IP addresses.

AI-Powered Analysis

AILast updated: 10/13/2025, 07:48:18 UTC

Technical Analysis

CVE-2025-11671 is a vulnerability identified in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The root cause is a missing authentication mechanism on a critical web function, specifically a page that, when accessed, reveals sensitive information such as account names and IP addresses. This vulnerability falls under CWE-306, which pertains to missing authentication for critical functions. The flaw allows unauthenticated remote attackers to directly access this page without any credentials or user interaction, making exploitation straightforward over the network. The CVSS v3.1 base score is 5.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Although no public exploits are currently known, the disclosed information could facilitate further attacks by providing attackers with internal account names and IP addresses, which are valuable for reconnaissance and lateral movement. The affected versions are unspecified (noted as '0'), suggesting possibly all current versions or a placeholder. No patches have been linked yet, indicating that remediation may require vendor engagement or temporary mitigations. This vulnerability highlights a critical lapse in access control on a web server component used in medical imaging or healthcare environments, where Uniweb/SoliPACS is typically deployed.

Potential Impact

For European organizations, especially those in healthcare and medical imaging sectors that rely on Uniweb/SoliPACS WebServer, this vulnerability poses a risk of unauthorized information disclosure. The exposure of account names and IP addresses can aid attackers in mapping internal networks, identifying valid user accounts, and planning targeted attacks such as phishing, credential stuffing, or lateral movement within the network. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can lead to further exploitation. Given the critical nature of healthcare data and the regulatory environment in Europe (e.g., GDPR), even limited information disclosure can have compliance and reputational consequences. Organizations with interconnected systems or remote access to Uniweb/SoliPACS are particularly vulnerable. The absence of authentication on critical functions also raises concerns about other potential undisclosed vulnerabilities. The medium severity rating suggests a moderate but non-trivial impact, warranting prompt attention to prevent escalation.

Mitigation Recommendations

1. Immediately restrict network access to the Uniweb/SoliPACS WebServer, especially the specific page identified as vulnerable, using firewalls, VPNs, or network segmentation to limit exposure to trusted users only. 2. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized access attempts to the vulnerable endpoint. 3. Conduct thorough audits of the Uniweb/SoliPACS WebServer configuration to ensure all critical functions require proper authentication and authorization. 4. Engage with EBM Technologies to obtain official patches or updates addressing the missing authentication issue; if unavailable, request guidance or temporary workarounds. 5. Monitor logs and network traffic for unusual access patterns or reconnaissance activities targeting the web server. 6. Educate IT and security teams about this vulnerability and the importance of securing all web server functions, especially in healthcare environments. 7. Consider deploying intrusion detection systems (IDS) tuned to detect exploitation attempts related to this vulnerability. 8. Review and strengthen overall identity and access management policies to minimize the risk of unauthorized access. 9. Plan for incident response readiness in case exploitation attempts are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-10-13T05:59:26.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ecae3d13a035d7a7575c23

Added to database: 10/13/2025, 7:46:05 AM

Last enriched: 10/13/2025, 7:48:18 AM

Last updated: 10/13/2025, 10:14:19 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats