Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14096: CWE-798: Use of Hard-coded Credentials in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers

0
High
VulnerabilityCVE-2025-14096cvecve-2025-14096cwe-798cwe-250
Published: Wed Dec 17 2025 (12/17/2025, 12:19:27 UTC)
Source: CVE Database V5
Vendor/Project: Radiometer Medical Aps
Product: ABL90 FLEX and ABL90 FLEX PLUS Analyzers

Description

A vulnerability exists in multiple Radiometer products that allow an attacker with physical access to the analyzer possibility to extract credential information. The vulnerability is due to a weakness in the design and insufficient credential protection in operating system. Other related CVE's are CVE-2025-14095 & CVE-2025-14097. Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required Configuration for Exposure: Attacker requires physical access to the analyzer. Temporary work Around: Only authorized people can physically access the analyzer. Permanent solution: Local Radiometer representatives will contact all affected customers to discuss a permanent solution. Exploit Status: Researchers have provided a working proof-of-concept (PoC). Radiometer is not aware of any public exploit code at the time of this publication.

AI-Powered Analysis

AILast updated: 12/24/2025, 13:17:14 UTC

Technical Analysis

CVE-2025-14096 identifies a critical security vulnerability in Radiometer Medical Aps’ ABL90 FLEX and ABL90 FLEX PLUS blood gas analyzers, which run on legacy Windows 7 and Windows XP operating systems. The vulnerability stems from the use of hard-coded credentials embedded within the device’s operating system, a design weakness classified under CWE-798 (Use of Hard-coded Credentials) and CWE-250 (Execution with Unnecessary Privileges). An attacker who gains physical access to the analyzer can extract these credentials, potentially allowing unauthorized access to the device’s system and sensitive medical data. The flaw compromises confidentiality by exposing credential information, integrity by enabling unauthorized system modifications, and availability by potentially disrupting device operations. The vulnerability requires no user interaction or prior authentication but does require physical access, limiting remote exploitation. Radiometer has informed affected customers and is working on permanent fixes, although no patches have been publicly released yet. Researchers have demonstrated a proof-of-concept exploit, but no known public exploits are currently active. The vulnerability is exacerbated by the use of outdated operating systems, which may lack modern security controls. This issue highlights the risks of embedded medical devices relying on legacy software and insufficient credential management.

Potential Impact

For European organizations, particularly healthcare providers, this vulnerability poses significant risks. The ABL90 FLEX analyzers are used in clinical settings for critical blood gas analysis, and compromise could lead to unauthorized access to patient data, manipulation of diagnostic results, or denial of service. Such impacts could undermine patient safety, violate data protection regulations like GDPR, and disrupt clinical workflows. The requirement for physical access somewhat limits the threat to insiders or attackers with physical proximity, but healthcare environments often have multiple personnel with device access, increasing risk. Additionally, the use of legacy Windows operating systems means these devices may be more susceptible to other attacks if compromised. The reputational damage and regulatory consequences of a breach involving medical devices are severe. European healthcare institutions must prioritize securing physical access and coordinate with Radiometer for updates to prevent exploitation. Failure to address this vulnerability could lead to targeted attacks against critical healthcare infrastructure, especially in countries with advanced medical services and high Radiometer device adoption.

Mitigation Recommendations

1. Enforce strict physical security controls around all ABL90 FLEX and ABL90 FLEX PLUS analyzers to ensure only authorized personnel can access the devices. 2. Implement access logging and monitoring in clinical areas to detect unauthorized physical access attempts. 3. Coordinate promptly with Radiometer representatives to obtain and apply permanent fixes or firmware updates once available. 4. Consider network segmentation to isolate analyzers from broader hospital networks, limiting lateral movement if a device is compromised. 5. Conduct regular security training for healthcare staff emphasizing the importance of physical device security. 6. Evaluate the feasibility of upgrading or replacing devices running unsupported operating systems with more secure alternatives. 7. Maintain an inventory of all affected devices and track remediation status. 8. Review and enhance endpoint security policies to include medical device protection. 9. Prepare incident response plans specific to medical device compromise scenarios. 10. Engage with regulatory bodies to ensure compliance with medical device security standards and reporting requirements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Radiometer
Date Reserved
2025-12-05T10:50:00.566Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942a591d5dc0d5a04f3ed84

Added to database: 12/17/2025, 12:44:01 PM

Last enriched: 12/24/2025, 1:17:14 PM

Last updated: 2/6/2026, 12:02:13 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats