CVE-2025-15581: CWE-287 Improper Authentication in orthanc-server orthanc
Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.
AI Analysis
Technical Summary
CVE-2025-15581 identifies a security vulnerability in the Orthanc server, an open-source DICOM medical imaging archive widely used in healthcare environments. The flaw resides in the HTTP Basic Authentication mechanism implemented in Orthanc versions before 1.12.10, where improper authorization logic allows an attacker to bypass or escalate privileges. Specifically, the vulnerability is categorized under CWE-287 (Improper Authentication), indicating that the authentication checks do not sufficiently verify user credentials or session states, enabling unauthorized privilege escalation. Successful exploitation could allow an attacker with limited privileges or requiring some user interaction to gain full administrative rights on the Orthanc server. This elevated access could lead to unauthorized viewing, modification, or deletion of sensitive medical imaging data, severely impacting confidentiality and integrity. The CVSS 4.7 score reflects a medium severity, considering the network attack vector, low attack complexity, partial authentication required, and high impact on confidentiality. No public exploits have been reported yet, but the vulnerability's presence in critical healthcare infrastructure makes it a significant concern. The flaw affects all versions prior to 1.12.10, and no patch links were provided, but upgrading to the fixed version is the primary remediation step.
Potential Impact
For European organizations, particularly those in the healthcare sector, this vulnerability poses a significant risk. Orthanc servers often store and manage sensitive patient imaging data, and unauthorized administrative access could lead to data breaches, manipulation of medical records, or disruption of healthcare services. The impact extends beyond confidentiality to integrity and availability, as attackers could alter or delete critical medical images or configurations. Given the reliance on Orthanc in hospitals and medical research institutions across Europe, exploitation could undermine patient trust and violate GDPR regulations concerning personal health data protection. Additionally, healthcare providers may face operational disruptions and reputational damage. The medium CVSS score suggests moderate ease of exploitation, but the consequences of a successful attack are severe, warranting urgent attention.
Mitigation Recommendations
1. Immediately upgrade Orthanc servers to version 1.12.10 or later where the authentication flaw is corrected. 2. Conduct a thorough audit of authentication and authorization configurations to ensure no legacy or weak credentials remain. 3. Implement network segmentation to restrict access to Orthanc servers only to trusted internal systems and personnel. 4. Enable and monitor detailed logging for authentication attempts and administrative actions to detect suspicious activities early. 5. Use multi-factor authentication (MFA) where possible to add an additional security layer beyond HTTP Basic Authentication. 6. Regularly review and update access control policies to minimize privilege assignments and enforce the principle of least privilege. 7. Educate staff about phishing and social engineering risks that could facilitate user interaction needed for exploitation. 8. Establish incident response procedures specific to medical imaging systems to quickly contain and remediate any compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-15581: CWE-287 Improper Authentication in orthanc-server orthanc
Description
Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.
AI-Powered Analysis
Technical Analysis
CVE-2025-15581 identifies a security vulnerability in the Orthanc server, an open-source DICOM medical imaging archive widely used in healthcare environments. The flaw resides in the HTTP Basic Authentication mechanism implemented in Orthanc versions before 1.12.10, where improper authorization logic allows an attacker to bypass or escalate privileges. Specifically, the vulnerability is categorized under CWE-287 (Improper Authentication), indicating that the authentication checks do not sufficiently verify user credentials or session states, enabling unauthorized privilege escalation. Successful exploitation could allow an attacker with limited privileges or requiring some user interaction to gain full administrative rights on the Orthanc server. This elevated access could lead to unauthorized viewing, modification, or deletion of sensitive medical imaging data, severely impacting confidentiality and integrity. The CVSS 4.7 score reflects a medium severity, considering the network attack vector, low attack complexity, partial authentication required, and high impact on confidentiality. No public exploits have been reported yet, but the vulnerability's presence in critical healthcare infrastructure makes it a significant concern. The flaw affects all versions prior to 1.12.10, and no patch links were provided, but upgrading to the fixed version is the primary remediation step.
Potential Impact
For European organizations, particularly those in the healthcare sector, this vulnerability poses a significant risk. Orthanc servers often store and manage sensitive patient imaging data, and unauthorized administrative access could lead to data breaches, manipulation of medical records, or disruption of healthcare services. The impact extends beyond confidentiality to integrity and availability, as attackers could alter or delete critical medical images or configurations. Given the reliance on Orthanc in hospitals and medical research institutions across Europe, exploitation could undermine patient trust and violate GDPR regulations concerning personal health data protection. Additionally, healthcare providers may face operational disruptions and reputational damage. The medium CVSS score suggests moderate ease of exploitation, but the consequences of a successful attack are severe, warranting urgent attention.
Mitigation Recommendations
1. Immediately upgrade Orthanc servers to version 1.12.10 or later where the authentication flaw is corrected. 2. Conduct a thorough audit of authentication and authorization configurations to ensure no legacy or weak credentials remain. 3. Implement network segmentation to restrict access to Orthanc servers only to trusted internal systems and personnel. 4. Enable and monitor detailed logging for authentication attempts and administrative actions to detect suspicious activities early. 5. Use multi-factor authentication (MFA) where possible to add an additional security layer beyond HTTP Basic Authentication. 6. Regularly review and update access control policies to minimize privilege assignments and enforce the principle of least privilege. 7. Educate staff about phishing and social engineering risks that could facilitate user interaction needed for exploitation. 8. Establish incident response procedures specific to medical imaging systems to quickly contain and remediate any compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- PRJBLK
- Date Reserved
- 2026-02-18T03:40:45.397Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699647126aea4a407af0a2b6
Added to database: 2/18/2026, 11:11:14 PM
Last enriched: 2/18/2026, 11:25:47 PM
Last updated: 2/19/2026, 12:33:39 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2686: OS Command Injection in SECCN Dingcheng G10
CriticalCVE-2026-2684: Unrestricted Upload in Tsinghua Unigroup Electronic Archives System
MediumCVE-2026-24126: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in WeblateOrg weblate
MediumCVE-2026-2683: Path Traversal in Tsinghua Unigroup Electronic Archives System
MediumCVE-2026-2682: SQL Injection in Tsinghua Unigroup Electronic Archives System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.