Skip to main content

CVE-2025-2313: CWE-94 Improper Control of Generation of Code ('Code Injection') in CGM CGM CLININET

Critical
VulnerabilityCVE-2025-2313cvecve-2025-2313cwe-94
Published: Wed Aug 27 2025 (08/27/2025, 10:18:51 UTC)
Source: CVE Database V5
Vendor/Project: CGM
Product: CGM CLININET

Description

In the Print.pl service, the "uhcPrintServerPrint" function allows execution of arbitrary code via the "CopyCounter" parameter.

AI-Powered Analysis

AILast updated: 08/27/2025, 10:51:19 UTC

Technical Analysis

CVE-2025-2313 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection) affecting the CGM CLININET product, specifically within the Print.pl service. The vulnerability arises from the "uhcPrintServerPrint" function, which improperly handles the "CopyCounter" parameter, allowing an attacker to execute arbitrary code on the affected system. This means that an attacker can craft malicious input for the CopyCounter parameter that gets executed as code, potentially leading to full system compromise. The vulnerability has a CVSS 4.0 base score of 9.4, indicating a critical severity level. The attack vector is adjacent network (AV:A), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), and the scope is changed (S:CH), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in March 2025 and published in August 2025 by CERT-PL. Given the nature of the vulnerability, it poses a severe risk to any organization using CGM CLININET, especially in healthcare environments where this product is typically deployed for clinical information management and printing services.

Potential Impact

For European organizations, particularly healthcare providers using CGM CLININET, this vulnerability could have devastating consequences. Successful exploitation allows remote code execution without authentication or user interaction, enabling attackers to gain full control over affected systems. This can lead to unauthorized access to sensitive patient data, disruption of clinical workflows, and potential manipulation or destruction of medical records. The critical nature of the vulnerability threatens confidentiality, integrity, and availability of healthcare services, potentially causing harm to patient care and violating strict European data protection regulations such as GDPR. Additionally, healthcare infrastructure is a high-value target for ransomware and other cyberattacks, so this vulnerability could be leveraged as an entry point for broader network compromise. The lack of available patches increases the urgency for organizations to implement mitigations. The impact extends beyond healthcare providers to any connected systems relying on CGM CLININET's printing services, potentially affecting operational continuity and trust in clinical IT systems across Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement compensating controls. First, restrict network access to the Print.pl service by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. Employ application-layer filtering or web application firewalls (WAFs) to detect and block suspicious input patterns targeting the CopyCounter parameter. Conduct thorough logging and monitoring of Print.pl service activity to identify anomalous requests indicative of exploitation attempts. Disable or isolate the vulnerable Print.pl service if feasible until a patch is available. Coordinate with CGM for timely updates and apply patches as soon as they are released. Additionally, perform regular security assessments and penetration testing focused on this vulnerability vector. Educate IT and security teams about the risks and signs of exploitation to enable rapid incident response. Finally, ensure that backups of critical clinical data are up-to-date and tested for recovery to mitigate potential ransomware or destructive attacks leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-03-14T14:56:31.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aeded3ad5a09ad0061118a

Added to database: 8/27/2025, 10:32:51 AM

Last enriched: 8/27/2025, 10:51:19 AM

Last updated: 9/3/2025, 12:34:11 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats