CVE-2025-11672: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer
Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain user group names.
AI Analysis
Technical Summary
CVE-2025-11672 identifies a missing authentication vulnerability (CWE-306) in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The vulnerability allows unauthenticated remote attackers to access a particular web page that reveals user group names. This occurs because the affected page does not enforce any authentication or authorization checks, exposing internal user group information to anyone who can reach the web server. The disclosed user group names can provide attackers with valuable intelligence about the system's user roles and permissions, facilitating further targeted attacks such as privilege escalation or social engineering. The vulnerability affects all versions of the product as indicated (version 0 listed, likely meaning all or initial versions). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no authentication or user interaction required, and low impact on confidentiality only. There is no known exploit in the wild, and no patches have been published yet. The vulnerability is classified as medium severity due to the limited scope of information disclosure and lack of direct system compromise. However, it poses a risk as an initial reconnaissance vector in multi-stage attacks against healthcare or medical imaging environments where Uniweb/SoliPACS is deployed.
Potential Impact
For European organizations, especially those in healthcare and medical imaging sectors using Uniweb/SoliPACS WebServer, this vulnerability can lead to unauthorized disclosure of user group information. While the direct impact on confidentiality is low, the information gained can assist attackers in mapping user roles and planning more sophisticated attacks such as privilege escalation or targeted phishing. This could indirectly compromise patient data confidentiality or disrupt healthcare services if followed by further exploitation. The vulnerability does not affect system integrity or availability directly, but the reconnaissance advantage it provides increases the overall risk posture. Given the critical nature of healthcare infrastructure in Europe and strict data protection regulations like GDPR, even limited information disclosure can have regulatory and reputational consequences. Organizations relying on this product should consider the vulnerability a potential stepping stone for attackers and act accordingly.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Uniweb/SoliPACS WebServer to trusted internal networks only, using network segmentation and firewalls to block unauthorized external access. Employ web application firewalls (WAFs) to detect and block requests targeting the vulnerable page. Conduct thorough audits of user group configurations and minimize exposed user roles to reduce the value of disclosed information. Monitor web server logs for unusual access patterns to the specific page. Engage with EBM Technologies for timely patch updates and apply them as soon as they are released. Additionally, implement strong authentication and authorization mechanisms on all web server functions and conduct regular security assessments to identify similar weaknesses. Educate IT staff about the risks of missing authentication controls and ensure secure development practices are followed for future updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-11672: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer
Description
Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain user group names.
AI-Powered Analysis
Technical Analysis
CVE-2025-11672 identifies a missing authentication vulnerability (CWE-306) in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The vulnerability allows unauthenticated remote attackers to access a particular web page that reveals user group names. This occurs because the affected page does not enforce any authentication or authorization checks, exposing internal user group information to anyone who can reach the web server. The disclosed user group names can provide attackers with valuable intelligence about the system's user roles and permissions, facilitating further targeted attacks such as privilege escalation or social engineering. The vulnerability affects all versions of the product as indicated (version 0 listed, likely meaning all or initial versions). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no authentication or user interaction required, and low impact on confidentiality only. There is no known exploit in the wild, and no patches have been published yet. The vulnerability is classified as medium severity due to the limited scope of information disclosure and lack of direct system compromise. However, it poses a risk as an initial reconnaissance vector in multi-stage attacks against healthcare or medical imaging environments where Uniweb/SoliPACS is deployed.
Potential Impact
For European organizations, especially those in healthcare and medical imaging sectors using Uniweb/SoliPACS WebServer, this vulnerability can lead to unauthorized disclosure of user group information. While the direct impact on confidentiality is low, the information gained can assist attackers in mapping user roles and planning more sophisticated attacks such as privilege escalation or targeted phishing. This could indirectly compromise patient data confidentiality or disrupt healthcare services if followed by further exploitation. The vulnerability does not affect system integrity or availability directly, but the reconnaissance advantage it provides increases the overall risk posture. Given the critical nature of healthcare infrastructure in Europe and strict data protection regulations like GDPR, even limited information disclosure can have regulatory and reputational consequences. Organizations relying on this product should consider the vulnerability a potential stepping stone for attackers and act accordingly.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Uniweb/SoliPACS WebServer to trusted internal networks only, using network segmentation and firewalls to block unauthorized external access. Employ web application firewalls (WAFs) to detect and block requests targeting the vulnerable page. Conduct thorough audits of user group configurations and minimize exposed user roles to reduce the value of disclosed information. Monitor web server logs for unusual access patterns to the specific page. Engage with EBM Technologies for timely patch updates and apply them as soon as they are released. Additionally, implement strong authentication and authorization mechanisms on all web server functions and conduct regular security assessments to identify similar weaknesses. Educate IT staff about the risks of missing authentication controls and ensure secure development practices are followed for future updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-10-13T05:59:28.184Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ecae3d13a035d7a7575c18
Added to database: 10/13/2025, 7:46:05 AM
Last enriched: 10/13/2025, 7:48:30 AM
Last updated: 10/13/2025, 9:03:17 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
13th October – Threat Intelligence Report
MediumExtortion Group Leaks Millions of Records From Salesforce Hacks
MediumCVE-2025-9968: CWE-59 Improper Link Resolution Before File Access ('Link Following') in ASUS Armoury Crate
HighCVE-2025-11674: CWE-918 Server-Side Request Forgery (SSRF) in PiExtract SOOP-CLM
MediumCVE-2025-11668: SQL Injection in code-projects Automated Voting System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.