Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14097: CWE-287: Improper Authentication in Radiometer Medical Aps ABL90 FLEX and ABL90 FLEX PLUS Analyzers

0
High
VulnerabilityCVE-2025-14097cvecve-2025-14097cwe-287
Published: Wed Dec 17 2025 (12/17/2025, 12:36:03 UTC)
Source: CVE Database V5
Vendor/Project: Radiometer Medical Aps
Product: ABL90 FLEX and ABL90 FLEX PLUS Analyzers

Description

A vulnerability in the application software of multiple Radiometer products may allow remote code execution and unauthorized device management when specific internal conditions are met. Exploitation requires that a remote connection is established with additional information obtained through other means. The issue is caused by a weakness in the analyzer’s application software.                                                                                                                                                                                                Other related CVE's are CVE-2025-14095 & CVE-2025-14096.                                                                                                      Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required Configuration for Exposure: Affected application software version is in use and remote support feature is enabled in the analyzer.                                                                                                                                                                        Temporary work Around: If the network is not considered secure, please remove the analyzer from the network.                         Permanent solution: Customers should ensure the following: • The network is secure, and access follows best practices. Local Radiometer representatives will contact all affected customers to discuss a permanent solution.                                                      Exploit Status: Researchers have provided working proof-of-concept (PoC). Radiometer is not aware of any publicly available exploits at the time of this publication.

AI-Powered Analysis

AILast updated: 12/24/2025, 13:17:27 UTC

Technical Analysis

CVE-2025-14097 is an improper authentication vulnerability (CWE-287) found in the application software of Radiometer Medical Aps' ABL90 FLEX and ABL90 FLEX PLUS blood gas analyzers. These devices run on legacy Windows 7 or Windows XP operating systems with application software versions earlier than 3.5MR11. The vulnerability arises from a weakness in the authentication mechanism of the analyzer's application software, specifically when the remote support feature is enabled. An attacker who can establish a remote connection and has obtained additional information through other means can exploit this flaw to execute arbitrary code remotely and gain unauthorized control over the device. This could allow manipulation of device functions, potentially altering medical test results or disrupting device operations. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require high privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are currently known, researchers have demonstrated proof-of-concept exploits. The vendor recommends ensuring the network environment is secure and disabling the remote support feature if the network cannot be trusted. Radiometer is engaging affected customers to provide permanent solutions. This vulnerability is related to CVE-2025-14095 and CVE-2025-14096, indicating a broader issue in the product line's authentication mechanisms.

Potential Impact

For European organizations, particularly healthcare providers using Radiometer ABL90 FLEX and FLEX PLUS analyzers, this vulnerability presents a significant risk. Exploitation could lead to unauthorized remote control of critical medical devices, potentially resulting in incorrect diagnostic results, disruption of medical workflows, or exposure of sensitive patient data. The impact on patient safety is considerable, as compromised analyzers may produce inaccurate blood gas measurements that inform critical treatment decisions. Additionally, unauthorized device management could be leveraged to disrupt hospital operations or serve as a foothold for broader network intrusion. Given the use of legacy operating systems, patching and mitigation may be challenging, increasing exposure duration. The requirement for remote support to be enabled and network access means that organizations with poorly segmented or unsecured medical device networks are at higher risk. The confidentiality, integrity, and availability of medical data and device functionality are all at risk, potentially leading to regulatory and compliance issues under GDPR and healthcare regulations.

Mitigation Recommendations

European healthcare organizations should immediately assess whether affected Radiometer analyzers are deployed and verify the application software versions. If the remote support feature is enabled, and the network environment is not fully secured, this feature should be disabled or the device isolated from the network to prevent remote exploitation. Network segmentation should be enforced to separate medical devices from general IT infrastructure, limiting access to trusted personnel and systems only. Strong authentication and access controls must be implemented on networks hosting these devices. Organizations should coordinate with Radiometer representatives to obtain and apply permanent software updates or patches as soon as they become available. Monitoring network traffic for unusual connections to these analyzers can help detect attempted exploitation. Additionally, organizations should review and update their medical device security policies, including incident response plans tailored to medical device compromise. Given the legacy OS involved, consider plans for device replacement or OS upgrades where feasible to reduce long-term risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Radiometer
Date Reserved
2025-12-05T10:50:03.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942a932d5dc0d5a04f89563

Added to database: 12/17/2025, 12:59:30 PM

Last enriched: 12/24/2025, 1:17:27 PM

Last updated: 2/8/2026, 4:06:07 AM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats