CVE-2025-11672: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer
Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain user group names.
AI Analysis
Technical Summary
CVE-2025-11672 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The vulnerability arises because a specific web page within the product lacks proper authentication controls, allowing any remote attacker to access it without credentials. This page discloses user group names, which are sensitive internal details that can provide attackers with valuable information about the organizational structure and user privileges. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on integrity, availability, or system confidentiality beyond the disclosed user group names (VC:L). The vulnerability affects all versions identified (version 0), and no patches or known exploits are currently available. The lack of authentication on this critical function represents a significant security oversight, as it facilitates reconnaissance activities that could precede more damaging attacks such as privilege escalation or targeted intrusions. Given the product's use in environments like healthcare, where Uniweb/SoliPACS is often deployed for medical imaging and patient data management, the exposure of user group information could aid attackers in crafting sophisticated attacks against sensitive systems.
Potential Impact
For European organizations, particularly those in healthcare and sectors relying on Uniweb/SoliPACS WebServer, this vulnerability poses a risk primarily to confidentiality by leaking user group information. While it does not directly allow system compromise or data modification, the disclosed information can be leveraged by attackers to map user roles and plan targeted attacks such as phishing, social engineering, or privilege escalation attempts. This could lead to unauthorized access to sensitive patient data or disruption of healthcare services. The impact is heightened in environments with strict data protection regulations like GDPR, where unauthorized disclosure of internal user information can lead to compliance issues and reputational damage. Additionally, healthcare infrastructure is often a high-value target for cyberattacks in Europe, increasing the strategic importance of mitigating this vulnerability promptly.
Mitigation Recommendations
1. Immediately implement authentication controls on the affected web page to restrict access to authorized users only. 2. Conduct a thorough security review of all web server endpoints to ensure no other critical functions lack proper authentication. 3. Monitor web server logs for unusual or unauthorized access attempts to the vulnerable page or similar endpoints. 4. Employ network segmentation and firewall rules to limit external access to the Uniweb/SoliPACS WebServer, restricting it to trusted internal networks where possible. 5. Engage with EBM Technologies for official patches or updates addressing this vulnerability and apply them as soon as they become available. 6. Educate IT and security teams about the risks of information disclosure vulnerabilities and incorporate regular vulnerability scanning focused on authentication controls. 7. Consider deploying web application firewalls (WAFs) with custom rules to block unauthorized access attempts to sensitive pages until patches are applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-11672: CWE-306 Missing Authentication for Critical Function in EBM Technologies Uniweb/SoliPACS WebServer
Description
Uniweb/SoliPACS WebServer developed by EBM Technologies has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access a specific page to obtain user group names.
AI-Powered Analysis
Technical Analysis
CVE-2025-11672 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the Uniweb/SoliPACS WebServer developed by EBM Technologies. The vulnerability arises because a specific web page within the product lacks proper authentication controls, allowing any remote attacker to access it without credentials. This page discloses user group names, which are sensitive internal details that can provide attackers with valuable information about the organizational structure and user privileges. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on integrity, availability, or system confidentiality beyond the disclosed user group names (VC:L). The vulnerability affects all versions identified (version 0), and no patches or known exploits are currently available. The lack of authentication on this critical function represents a significant security oversight, as it facilitates reconnaissance activities that could precede more damaging attacks such as privilege escalation or targeted intrusions. Given the product's use in environments like healthcare, where Uniweb/SoliPACS is often deployed for medical imaging and patient data management, the exposure of user group information could aid attackers in crafting sophisticated attacks against sensitive systems.
Potential Impact
For European organizations, particularly those in healthcare and sectors relying on Uniweb/SoliPACS WebServer, this vulnerability poses a risk primarily to confidentiality by leaking user group information. While it does not directly allow system compromise or data modification, the disclosed information can be leveraged by attackers to map user roles and plan targeted attacks such as phishing, social engineering, or privilege escalation attempts. This could lead to unauthorized access to sensitive patient data or disruption of healthcare services. The impact is heightened in environments with strict data protection regulations like GDPR, where unauthorized disclosure of internal user information can lead to compliance issues and reputational damage. Additionally, healthcare infrastructure is often a high-value target for cyberattacks in Europe, increasing the strategic importance of mitigating this vulnerability promptly.
Mitigation Recommendations
1. Immediately implement authentication controls on the affected web page to restrict access to authorized users only. 2. Conduct a thorough security review of all web server endpoints to ensure no other critical functions lack proper authentication. 3. Monitor web server logs for unusual or unauthorized access attempts to the vulnerable page or similar endpoints. 4. Employ network segmentation and firewall rules to limit external access to the Uniweb/SoliPACS WebServer, restricting it to trusted internal networks where possible. 5. Engage with EBM Technologies for official patches or updates addressing this vulnerability and apply them as soon as they become available. 6. Educate IT and security teams about the risks of information disclosure vulnerabilities and incorporate regular vulnerability scanning focused on authentication controls. 7. Consider deploying web application firewalls (WAFs) with custom rules to block unauthorized access attempts to sensitive pages until patches are applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-10-13T05:59:28.184Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ecae3d13a035d7a7575c18
Added to database: 10/13/2025, 7:46:05 AM
Last enriched: 10/21/2025, 12:53:37 AM
Last updated: 12/1/2025, 11:00:41 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from
MediumCVE-2025-66448: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2025-66401: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in kapilduraphe mcp-watch
CriticalCVE-2025-66312: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumCVE-2025-66311: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.