Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12699: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in ZOLL ZOLL ePCR IOS Mobile Application

0
Medium
VulnerabilityCVE-2025-12699cvecve-2025-12699cwe-538
Published: Tue Feb 10 2026 (02/10/2026, 20:38:37 UTC)
Source: CVE Database V5
Vendor/Project: ZOLL
Product: ZOLL ePCR IOS Mobile Application

Description

The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.

AI-Powered Analysis

AILast updated: 02/18/2026, 09:47:19 UTC

Technical Analysis

CVE-2025-12699 is a vulnerability identified in the ZOLL ePCR iOS mobile application version 2.6.7, categorized under CWE-538, which involves the insertion of sensitive information into an externally accessible file or directory. The core issue arises from the application reflecting unsanitized user input into a WebView component. Specifically, attacker-controlled strings placed into patient care report (PCR) fields such as run number, incident, call sign, and notes are interpreted as HTML and JavaScript when the app renders or prints this content. This improper input sanitization allows an attacker to inject scripts that can execute within the app’s WebView context. The proof of concept demonstrates that injected scripts can read local files accessible to the app, which contain sensitive device and user data, including protected health information (PHI) and device telemetry. This local file read capability could lead to unauthorized disclosure of sensitive medical data. The vulnerability does not require any privileges (PR:N) but does require user interaction (UI:A) to trigger the malicious content rendering. The attack vector is local (AV:L), meaning the attacker must have local access to the device or the ability to influence the input fields. The vulnerability has a CVSS 4.0 score of 6.7, indicating a medium severity level. No patches are currently linked, and no known exploits are reported in the wild. The vulnerability’s impact is primarily on confidentiality, with no direct impact on integrity or availability. The issue highlights the risks of embedding unsanitized user input in WebView components within mobile healthcare applications, which can lead to data leakage and privacy violations.

Potential Impact

For European organizations, particularly healthcare providers using the ZOLL ePCR iOS application, this vulnerability poses a significant risk to the confidentiality of sensitive patient data. Exposure of protected health information (PHI) can lead to severe regulatory consequences under GDPR, including fines and reputational damage. The leakage of device telemetry could also provide attackers with insights into device configurations and usage patterns, potentially facilitating further attacks. Since the vulnerability requires local access and user interaction, the risk is somewhat mitigated but remains substantial in environments where devices are shared, lost, or accessed by unauthorized personnel. The impact extends to patient trust and compliance with healthcare data protection standards. Additionally, healthcare organizations could face operational disruptions if they must take affected devices offline to remediate the issue. Overall, the vulnerability threatens data confidentiality and privacy, which are critical in the healthcare sector.

Mitigation Recommendations

European healthcare organizations should prioritize the following mitigations: 1) Monitor for and apply any official patches or updates released by ZOLL promptly once available. 2) Implement strict input validation and sanitization controls on all PCR fields to prevent injection of malicious scripts. 3) Disable or sandbox WebView components to restrict execution of untrusted content, limiting their ability to access local files. 4) Enforce device-level security controls such as strong authentication, device encryption, and mobile device management (MDM) policies to reduce risk of unauthorized local access. 5) Educate users on the risks of interacting with untrusted or suspicious PCR data entries and encourage reporting of anomalous app behavior. 6) Conduct regular audits of application logs and device telemetry to detect potential exploitation attempts. 7) Consider network segmentation and limiting the use of the vulnerable app to trusted environments to reduce exposure. These measures go beyond generic advice by focusing on application-specific controls and operational security practices tailored to the healthcare context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-04T15:39:58.840Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b9ca04b57a58fa12a793d

Added to database: 2/10/2026, 9:01:20 PM

Last enriched: 2/18/2026, 9:47:19 AM

Last updated: 2/21/2026, 12:21:37 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats