CVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
An attacker could exploit this vulnerability by uploading arbitrary files via a specific service, which could lead to system compromise.
AI Analysis
Technical Summary
CVE-2025-24489 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the INFINITT Healthcare INFINITT PACS System Manager. This vulnerability allows an attacker with limited privileges (PR:L) to upload arbitrary files through a specific service interface without requiring user interaction (UI:N). The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L). Successful exploitation could lead to partial compromise of confidentiality, integrity, and availability of the affected system. Specifically, an attacker could upload malicious files, potentially leading to execution of arbitrary code, unauthorized access to sensitive medical imaging data, or disruption of PACS services. The vulnerability affects all versions indicated as '0' (likely meaning initial or unspecified versions) and was published on August 21, 2025. The CVSS v3.1 base score is 6.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's impact is significant given the critical role of PACS (Picture Archiving and Communication System) in healthcare environments, where maintaining the confidentiality and integrity of medical images and patient data is paramount. The lack of user interaction requirement and network accessibility increase the risk profile, especially in environments where the system is exposed or insufficiently segmented.
Potential Impact
For European healthcare organizations, this vulnerability poses a substantial risk. PACS systems are integral to diagnostic workflows, storing and transmitting sensitive patient imaging data. Exploitation could lead to unauthorized disclosure of protected health information (PHI), violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity compromise could lead to altered or corrupted medical images, potentially causing misdiagnosis or treatment errors. Availability impact could disrupt clinical operations, delaying patient care. Given the interconnected nature of healthcare IT infrastructures in Europe, a successful attack could propagate or be leveraged for further lateral movement. Additionally, healthcare providers are high-value targets for ransomware and espionage, increasing the attractiveness of this vulnerability to threat actors. The medium CVSS score suggests a moderate but non-negligible risk, especially if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
European healthcare organizations using INFINITT PACS System Manager should implement the following specific mitigations: 1) Immediately restrict network access to the PACS System Manager service to trusted internal networks and authorized personnel only, using network segmentation and firewall rules. 2) Enforce strict access controls and monitor accounts with privileges capable of uploading files to the system, employing multi-factor authentication where possible. 3) Implement file upload validation and filtering at the network or application layer to detect and block suspicious file types or payloads. 4) Conduct regular integrity checks and monitoring of uploaded files and system binaries to detect unauthorized changes. 5) Maintain comprehensive logging and alerting for file upload activities to enable rapid detection and response. 6) Engage with INFINITT Healthcare for timely patch releases and apply updates as soon as they become available. 7) Perform security assessments and penetration testing focused on file upload functionalities to identify additional weaknesses. 8) Educate IT and security staff about the risks associated with this vulnerability and the importance of rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Switzerland, Austria
CVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
Description
An attacker could exploit this vulnerability by uploading arbitrary files via a specific service, which could lead to system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-24489 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the INFINITT Healthcare INFINITT PACS System Manager. This vulnerability allows an attacker with limited privileges (PR:L) to upload arbitrary files through a specific service interface without requiring user interaction (UI:N). The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L). Successful exploitation could lead to partial compromise of confidentiality, integrity, and availability of the affected system. Specifically, an attacker could upload malicious files, potentially leading to execution of arbitrary code, unauthorized access to sensitive medical imaging data, or disruption of PACS services. The vulnerability affects all versions indicated as '0' (likely meaning initial or unspecified versions) and was published on August 21, 2025. The CVSS v3.1 base score is 6.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's impact is significant given the critical role of PACS (Picture Archiving and Communication System) in healthcare environments, where maintaining the confidentiality and integrity of medical images and patient data is paramount. The lack of user interaction requirement and network accessibility increase the risk profile, especially in environments where the system is exposed or insufficiently segmented.
Potential Impact
For European healthcare organizations, this vulnerability poses a substantial risk. PACS systems are integral to diagnostic workflows, storing and transmitting sensitive patient imaging data. Exploitation could lead to unauthorized disclosure of protected health information (PHI), violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity compromise could lead to altered or corrupted medical images, potentially causing misdiagnosis or treatment errors. Availability impact could disrupt clinical operations, delaying patient care. Given the interconnected nature of healthcare IT infrastructures in Europe, a successful attack could propagate or be leveraged for further lateral movement. Additionally, healthcare providers are high-value targets for ransomware and espionage, increasing the attractiveness of this vulnerability to threat actors. The medium CVSS score suggests a moderate but non-negligible risk, especially if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
European healthcare organizations using INFINITT PACS System Manager should implement the following specific mitigations: 1) Immediately restrict network access to the PACS System Manager service to trusted internal networks and authorized personnel only, using network segmentation and firewall rules. 2) Enforce strict access controls and monitor accounts with privileges capable of uploading files to the system, employing multi-factor authentication where possible. 3) Implement file upload validation and filtering at the network or application layer to detect and block suspicious file types or payloads. 4) Conduct regular integrity checks and monitoring of uploaded files and system binaries to detect unauthorized changes. 5) Maintain comprehensive logging and alerting for file upload activities to enable rapid detection and response. 6) Engage with INFINITT Healthcare for timely patch releases and apply updates as soon as they become available. 7) Perform security assessments and penetration testing focused on file upload functionalities to identify additional weaknesses. 8) Educate IT and security staff about the risks associated with this vulnerability and the importance of rapid incident response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-03-19T16:39:28.811Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a77b71ad5a09ad0017da77
Added to database: 8/21/2025, 8:02:57 PM
Last enriched: 8/21/2025, 8:19:43 PM
Last updated: 8/21/2025, 8:19:43 PM
Views: 2
Related Threats
CVE-2025-51606: n/a
CriticalCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-55231: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2019
HighCVE-2025-55230: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.