CVE-2025-14096: CWE-798: Use of Hard-coded Credentials in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers
A vulnerability exists in multiple Radiometer products that allow an attacker with physical access to the analyzer possibility to extract credential information. The vulnerability is due to a weakness in the design and insufficient credential protection in operating system. Other related CVE's are CVE-2025-14095 & CVE-2025-14097. Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required Configuration for Exposure: Attacker requires physical access to the analyzer. Temporary work Around: Only authorized people can physically access the analyzer. Permanent solution: Local Radiometer representatives will contact all affected customers to discuss a permanent solution. Exploit Status: Researchers have provided a working proof-of-concept (PoC). Radiometer is not aware of any public exploit code at the time of this publication.
AI Analysis
Technical Summary
CVE-2025-14096 identifies a critical security vulnerability in Radiometer Medical Aps’ ABL90 FLEX and ABL90 FLEX PLUS blood gas analyzers, which run on legacy Windows 7 and Windows XP operating systems. The vulnerability stems from the use of hard-coded credentials embedded within the device’s operating system, a design weakness classified under CWE-798 (Use of Hard-coded Credentials) and CWE-250 (Execution with Unnecessary Privileges). An attacker who gains physical access to the analyzer can extract these credentials, potentially allowing unauthorized access to the device’s system and sensitive medical data. The flaw compromises confidentiality by exposing credential information, integrity by enabling unauthorized system modifications, and availability by potentially disrupting device operations. The vulnerability requires no user interaction or prior authentication but does require physical access, limiting remote exploitation. Radiometer has informed affected customers and is working on permanent fixes, although no patches have been publicly released yet. Researchers have demonstrated a proof-of-concept exploit, but no known public exploits are currently active. The vulnerability is exacerbated by the use of outdated operating systems, which may lack modern security controls. This issue highlights the risks of embedded medical devices relying on legacy software and insufficient credential management.
Potential Impact
For European organizations, particularly healthcare providers, this vulnerability poses significant risks. The ABL90 FLEX analyzers are used in clinical settings for critical blood gas analysis, and compromise could lead to unauthorized access to patient data, manipulation of diagnostic results, or denial of service. Such impacts could undermine patient safety, violate data protection regulations like GDPR, and disrupt clinical workflows. The requirement for physical access somewhat limits the threat to insiders or attackers with physical proximity, but healthcare environments often have multiple personnel with device access, increasing risk. Additionally, the use of legacy Windows operating systems means these devices may be more susceptible to other attacks if compromised. The reputational damage and regulatory consequences of a breach involving medical devices are severe. European healthcare institutions must prioritize securing physical access and coordinate with Radiometer for updates to prevent exploitation. Failure to address this vulnerability could lead to targeted attacks against critical healthcare infrastructure, especially in countries with advanced medical services and high Radiometer device adoption.
Mitigation Recommendations
1. Enforce strict physical security controls around all ABL90 FLEX and ABL90 FLEX PLUS analyzers to ensure only authorized personnel can access the devices. 2. Implement access logging and monitoring in clinical areas to detect unauthorized physical access attempts. 3. Coordinate promptly with Radiometer representatives to obtain and apply permanent fixes or firmware updates once available. 4. Consider network segmentation to isolate analyzers from broader hospital networks, limiting lateral movement if a device is compromised. 5. Conduct regular security training for healthcare staff emphasizing the importance of physical device security. 6. Evaluate the feasibility of upgrading or replacing devices running unsupported operating systems with more secure alternatives. 7. Maintain an inventory of all affected devices and track remediation status. 8. Review and enhance endpoint security policies to include medical device protection. 9. Prepare incident response plans specific to medical device compromise scenarios. 10. Engage with regulatory bodies to ensure compliance with medical device security standards and reporting requirements.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Denmark, Switzerland
CVE-2025-14096: CWE-798: Use of Hard-coded Credentials in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers
Description
A vulnerability exists in multiple Radiometer products that allow an attacker with physical access to the analyzer possibility to extract credential information. The vulnerability is due to a weakness in the design and insufficient credential protection in operating system. Other related CVE's are CVE-2025-14095 & CVE-2025-14097. Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required Configuration for Exposure: Attacker requires physical access to the analyzer. Temporary work Around: Only authorized people can physically access the analyzer. Permanent solution: Local Radiometer representatives will contact all affected customers to discuss a permanent solution. Exploit Status: Researchers have provided a working proof-of-concept (PoC). Radiometer is not aware of any public exploit code at the time of this publication.
AI-Powered Analysis
Technical Analysis
CVE-2025-14096 identifies a critical security vulnerability in Radiometer Medical Aps’ ABL90 FLEX and ABL90 FLEX PLUS blood gas analyzers, which run on legacy Windows 7 and Windows XP operating systems. The vulnerability stems from the use of hard-coded credentials embedded within the device’s operating system, a design weakness classified under CWE-798 (Use of Hard-coded Credentials) and CWE-250 (Execution with Unnecessary Privileges). An attacker who gains physical access to the analyzer can extract these credentials, potentially allowing unauthorized access to the device’s system and sensitive medical data. The flaw compromises confidentiality by exposing credential information, integrity by enabling unauthorized system modifications, and availability by potentially disrupting device operations. The vulnerability requires no user interaction or prior authentication but does require physical access, limiting remote exploitation. Radiometer has informed affected customers and is working on permanent fixes, although no patches have been publicly released yet. Researchers have demonstrated a proof-of-concept exploit, but no known public exploits are currently active. The vulnerability is exacerbated by the use of outdated operating systems, which may lack modern security controls. This issue highlights the risks of embedded medical devices relying on legacy software and insufficient credential management.
Potential Impact
For European organizations, particularly healthcare providers, this vulnerability poses significant risks. The ABL90 FLEX analyzers are used in clinical settings for critical blood gas analysis, and compromise could lead to unauthorized access to patient data, manipulation of diagnostic results, or denial of service. Such impacts could undermine patient safety, violate data protection regulations like GDPR, and disrupt clinical workflows. The requirement for physical access somewhat limits the threat to insiders or attackers with physical proximity, but healthcare environments often have multiple personnel with device access, increasing risk. Additionally, the use of legacy Windows operating systems means these devices may be more susceptible to other attacks if compromised. The reputational damage and regulatory consequences of a breach involving medical devices are severe. European healthcare institutions must prioritize securing physical access and coordinate with Radiometer for updates to prevent exploitation. Failure to address this vulnerability could lead to targeted attacks against critical healthcare infrastructure, especially in countries with advanced medical services and high Radiometer device adoption.
Mitigation Recommendations
1. Enforce strict physical security controls around all ABL90 FLEX and ABL90 FLEX PLUS analyzers to ensure only authorized personnel can access the devices. 2. Implement access logging and monitoring in clinical areas to detect unauthorized physical access attempts. 3. Coordinate promptly with Radiometer representatives to obtain and apply permanent fixes or firmware updates once available. 4. Consider network segmentation to isolate analyzers from broader hospital networks, limiting lateral movement if a device is compromised. 5. Conduct regular security training for healthcare staff emphasizing the importance of physical device security. 6. Evaluate the feasibility of upgrading or replacing devices running unsupported operating systems with more secure alternatives. 7. Maintain an inventory of all affected devices and track remediation status. 8. Review and enhance endpoint security policies to include medical device protection. 9. Prepare incident response plans specific to medical device compromise scenarios. 10. Engage with regulatory bodies to ensure compliance with medical device security standards and reporting requirements.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Radiometer
- Date Reserved
- 2025-12-05T10:50:00.566Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942a591d5dc0d5a04f3ed84
Added to database: 12/17/2025, 12:44:01 PM
Last enriched: 12/24/2025, 1:17:14 PM
Last updated: 2/6/2026, 12:02:13 AM
Views: 155
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.