Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11672: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer

0
Medium
VulnerabilityCVE-2025-11672cvecve-2025-11672cwe-306
Published: Mon Oct 13 2025 (10/13/2025, 07:32:57 UTC)
Source: CVE Database V5
Vendor/Project: EBM Technologies
Product: Uniweb/SoliPACS WebServer

Description

Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain user group names.

AI-Powered Analysis

AILast updated: 10/13/2025, 07:48:30 UTC

Technical Analysis

CVE-2025-11672 identifies a missing authentication vulnerability (CWE-306) in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The vulnerability allows unauthenticated remote attackers to access a particular web page that reveals user group names. This occurs because the affected page does not enforce any authentication or authorization checks, exposing internal user group information to anyone who can reach the web server. The disclosed user group names can provide attackers with valuable intelligence about the system's user roles and permissions, facilitating further targeted attacks such as privilege escalation or social engineering. The vulnerability affects all versions of the product as indicated (version 0 listed, likely meaning all or initial versions). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no authentication or user interaction required, and low impact on confidentiality only. There is no known exploit in the wild, and no patches have been published yet. The vulnerability is classified as medium severity due to the limited scope of information disclosure and lack of direct system compromise. However, it poses a risk as an initial reconnaissance vector in multi-stage attacks against healthcare or medical imaging environments where Uniweb/SoliPACS is deployed.

Potential Impact

For European organizations, especially those in healthcare and medical imaging sectors using Uniweb/SoliPACS WebServer, this vulnerability can lead to unauthorized disclosure of user group information. While the direct impact on confidentiality is low, the information gained can assist attackers in mapping user roles and planning more sophisticated attacks such as privilege escalation or targeted phishing. This could indirectly compromise patient data confidentiality or disrupt healthcare services if followed by further exploitation. The vulnerability does not affect system integrity or availability directly, but the reconnaissance advantage it provides increases the overall risk posture. Given the critical nature of healthcare infrastructure in Europe and strict data protection regulations like GDPR, even limited information disclosure can have regulatory and reputational consequences. Organizations relying on this product should consider the vulnerability a potential stepping stone for attackers and act accordingly.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Uniweb/SoliPACS WebServer to trusted internal networks only, using network segmentation and firewalls to block unauthorized external access. Employ web application firewalls (WAFs) to detect and block requests targeting the vulnerable page. Conduct thorough audits of user group configurations and minimize exposed user roles to reduce the value of disclosed information. Monitor web server logs for unusual access patterns to the specific page. Engage with EBM Technologies for timely patch updates and apply them as soon as they are released. Additionally, implement strong authentication and authorization mechanisms on all web server functions and conduct regular security assessments to identify similar weaknesses. Educate IT staff about the risks of missing authentication controls and ensure secure development practices are followed for future updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-10-13T05:59:28.184Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecae3d13a035d7a7575c18

Added to database: 10/13/2025, 7:46:05 AM

Last enriched: 10/13/2025, 7:48:30 AM

Last updated: 10/13/2025, 9:03:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats