Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15581: CWE-287 Improper Authentication in orthanc-server orthanc

0
Medium
VulnerabilityCVE-2025-15581cvecve-2025-15581cwe-287
Published: Wed Feb 18 2026 (02/18/2026, 22:59:55 UTC)
Source: CVE Database V5
Vendor/Project: orthanc-server
Product: orthanc

Description

Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.

AI-Powered Analysis

AILast updated: 02/18/2026, 23:25:47 UTC

Technical Analysis

CVE-2025-15581 identifies a security vulnerability in the Orthanc server, an open-source DICOM medical imaging archive widely used in healthcare environments. The flaw resides in the HTTP Basic Authentication mechanism implemented in Orthanc versions before 1.12.10, where improper authorization logic allows an attacker to bypass or escalate privileges. Specifically, the vulnerability is categorized under CWE-287 (Improper Authentication), indicating that the authentication checks do not sufficiently verify user credentials or session states, enabling unauthorized privilege escalation. Successful exploitation could allow an attacker with limited privileges or requiring some user interaction to gain full administrative rights on the Orthanc server. This elevated access could lead to unauthorized viewing, modification, or deletion of sensitive medical imaging data, severely impacting confidentiality and integrity. The CVSS 4.7 score reflects a medium severity, considering the network attack vector, low attack complexity, partial authentication required, and high impact on confidentiality. No public exploits have been reported yet, but the vulnerability's presence in critical healthcare infrastructure makes it a significant concern. The flaw affects all versions prior to 1.12.10, and no patch links were provided, but upgrading to the fixed version is the primary remediation step.

Potential Impact

For European organizations, particularly those in the healthcare sector, this vulnerability poses a significant risk. Orthanc servers often store and manage sensitive patient imaging data, and unauthorized administrative access could lead to data breaches, manipulation of medical records, or disruption of healthcare services. The impact extends beyond confidentiality to integrity and availability, as attackers could alter or delete critical medical images or configurations. Given the reliance on Orthanc in hospitals and medical research institutions across Europe, exploitation could undermine patient trust and violate GDPR regulations concerning personal health data protection. Additionally, healthcare providers may face operational disruptions and reputational damage. The medium CVSS score suggests moderate ease of exploitation, but the consequences of a successful attack are severe, warranting urgent attention.

Mitigation Recommendations

1. Immediately upgrade Orthanc servers to version 1.12.10 or later where the authentication flaw is corrected. 2. Conduct a thorough audit of authentication and authorization configurations to ensure no legacy or weak credentials remain. 3. Implement network segmentation to restrict access to Orthanc servers only to trusted internal systems and personnel. 4. Enable and monitor detailed logging for authentication attempts and administrative actions to detect suspicious activities early. 5. Use multi-factor authentication (MFA) where possible to add an additional security layer beyond HTTP Basic Authentication. 6. Regularly review and update access control policies to minimize privilege assignments and enforce the principle of least privilege. 7. Educate staff about phishing and social engineering risks that could facilitate user interaction needed for exploitation. 8. Establish incident response procedures specific to medical imaging systems to quickly contain and remediate any compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PRJBLK
Date Reserved
2026-02-18T03:40:45.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699647126aea4a407af0a2b6

Added to database: 2/18/2026, 11:11:14 PM

Last enriched: 2/18/2026, 11:25:47 PM

Last updated: 2/19/2026, 12:33:39 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats