Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14501: CWE-476: NULL Pointer Dereference in Sante PACS Server

0
High
VulnerabilityCVE-2025-14501cvecve-2025-14501cwe-476
Published: Tue Dec 23 2025 (12/23/2025, 21:18:40 UTC)
Source: CVE Database V5
Vendor/Project: Sante
Product: PACS Server

Description

Sante PACS Server HTTP Content-Length Header Handling NULL Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP Content-Length header. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-26770.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:45:53 UTC

Technical Analysis

CVE-2025-14501 is a vulnerability identified in Sante PACS Server version 4.2.2, specifically related to the handling of the HTTP Content-Length header. The root cause is a NULL pointer dereference (CWE-476) due to insufficient validation of a pointer before its use during HTTP request processing. When a remote attacker sends a malicious HTTP request with a crafted Content-Length header, the server attempts to access a NULL pointer, causing the application to crash and resulting in a denial-of-service (DoS) condition. This vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.0 base score is 7.5, reflecting high severity primarily due to the ease of exploitation (network vector, low complexity) and the complete loss of availability for the affected service. The Sante PACS Server is a medical imaging archive and communication system widely used in healthcare environments to store and manage medical images. Disruption of this service can severely impact clinical workflows and patient care. Although no public exploits have been reported yet, the vulnerability was reserved and published by the Zero Day Initiative (ZDI) under ZDI-CAN-26770, indicating credible discovery and potential for future exploitation. No official patches were listed at the time of reporting, emphasizing the need for proactive defensive measures.

Potential Impact

The primary impact of CVE-2025-14501 is denial of service, which affects the availability of the Sante PACS Server. For European healthcare organizations, this can translate into significant operational disruptions, including inability to access or store critical medical imaging data, delays in diagnosis and treatment, and potential patient safety risks. Since the vulnerability requires no authentication, attackers can exploit it from outside the network perimeter, increasing exposure. The loss of availability in healthcare IT systems is particularly critical due to the time-sensitive nature of medical services. Additionally, repeated exploitation attempts could lead to extended downtime or force emergency fallback procedures, straining IT resources. While confidentiality and integrity are not directly impacted, the unavailability of PACS services can indirectly affect patient care quality and compliance with healthcare regulations such as GDPR. Organizations relying on Sante PACS Server version 4.2.2 must consider this vulnerability a high operational risk.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available to address the NULL pointer dereference flaw. 2. In the absence of patches, implement network-level protections such as web application firewalls (WAFs) or intrusion prevention systems (IPS) configured to detect and block malformed HTTP requests, especially those with suspicious Content-Length headers. 3. Restrict external access to the PACS Server by placing it behind secure VPNs or segmented network zones to limit exposure to untrusted networks. 4. Monitor network traffic for anomalies related to HTTP headers and unusual request patterns targeting the PACS Server. 5. Conduct regular security assessments and penetration tests focusing on HTTP protocol handling to identify similar weaknesses. 6. Maintain up-to-date backups of PACS data and ensure rapid recovery procedures are in place to minimize downtime in case of successful DoS attacks. 7. Educate IT and security teams about this vulnerability to ensure timely detection and response. 8. Collaborate with the vendor for timely updates and guidance on secure configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-10T20:41:55.862Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0a18d69af40f312b7e44

Added to database: 12/23/2025, 9:31:04 PM

Last enriched: 12/23/2025, 9:45:53 PM

Last updated: 12/26/2025, 7:28:11 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats