Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15581: CWE-287 Improper Authentication in orthanc-server orthanc

0
Medium
VulnerabilityCVE-2025-15581cvecve-2025-15581cwe-287
Published: Wed Feb 18 2026 (02/18/2026, 22:59:55 UTC)
Source: CVE Database V5
Vendor/Project: orthanc-server
Product: orthanc

Description

Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 22:48:14 UTC

Technical Analysis

CVE-2025-15581 identifies an improper authentication vulnerability (CWE-287) in the Orthanc server, a popular open-source DICOM server used in medical imaging workflows. The flaw resides in the HTTP Basic Authentication logic prior to version 1.12.10, where the authorization mechanism does not correctly enforce privilege boundaries. This allows an attacker who has some level of authenticated access (low privileges) and can interact with the system over the network to escalate their privileges to full administrative rights. The vulnerability arises because the authorization checks fail to properly validate the credentials or session state, permitting unauthorized privilege escalation. The attack vector is network-based with low attack complexity but requires partial authentication and user interaction, limiting mass exploitation but posing a serious risk in targeted environments. The vulnerability does not directly compromise confidentiality, integrity, or availability but undermines access control, potentially allowing attackers to manipulate medical imaging data, disrupt workflows, or exfiltrate sensitive patient information. No public exploits or patches are currently available, but the Orthanc community is expected to release updates addressing this issue. The CVSS 4.7 score reflects the moderate risk, considering the need for authentication and user interaction but high impact on administrative control.

Potential Impact

The primary impact of CVE-2025-15581 is unauthorized privilege escalation within Orthanc servers, which can lead to full administrative access. This enables attackers to modify, delete, or exfiltrate sensitive medical imaging data, disrupt healthcare workflows, or manipulate patient records, potentially causing patient safety risks and regulatory non-compliance. Given Orthanc's role in medical imaging infrastructure, such unauthorized access could undermine trust in healthcare IT systems and lead to significant operational and reputational damage. The vulnerability's exploitation requires network access and some authentication, limiting exposure to internal or poorly secured external deployments. However, healthcare organizations worldwide using Orthanc are at risk, especially those with internet-facing or insufficiently segmented Orthanc instances. The lack of known exploits reduces immediate threat but does not eliminate the risk of future targeted attacks. Overall, the vulnerability poses a medium risk to confidentiality and integrity of medical data and availability of imaging services.

Mitigation Recommendations

Organizations should immediately audit their Orthanc server deployments to identify versions prior to 1.12.10 and plan for prompt upgrades once patches are released. Until patched, restrict network access to Orthanc servers using firewalls and network segmentation to limit exposure to trusted internal users only. Enforce strong authentication mechanisms and consider additional layers such as VPNs or IP whitelisting to reduce unauthorized access risk. Monitor Orthanc server logs for unusual authentication attempts or privilege escalations. Implement strict role-based access controls and minimize the number of users with administrative privileges. Regularly back up medical imaging data to enable recovery in case of compromise. Engage with the Orthanc community or vendor for updates and apply security advisories promptly. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block suspicious activity targeting Orthanc authentication endpoints. Finally, conduct security awareness training for administrators on the risks of privilege escalation vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PRJBLK
Date Reserved
2026-02-18T03:40:45.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699647126aea4a407af0a2b6

Added to database: 2/18/2026, 11:11:14 PM

Last enriched: 2/28/2026, 10:48:14 PM

Last updated: 4/5/2026, 12:32:18 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses