Skip to main content

CVE-2025-27580: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in NIH BRICS

Medium
Published: Wed Apr 23 2025 (04/23/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: NIH
Product: BRICS

Description

NIH BRICS (aka Biomedical Research Informatics Computing System) through 14.0.0-67 generates predictable tokens (that depend on username, time, and the fixed 7Dl9#dj- string) and thus allows unauthenticated users with a Common Access Card (CAC) to escalate privileges and compromise any account, including administrators.

AI-Powered Analysis

AILast updated: 06/24/2025, 04:41:33 UTC

Technical Analysis

CVE-2025-27580 is a vulnerability in the NIH Biomedical Research Informatics Computing System (BRICS) up to version 14.0.0-67. The core issue stems from CWE-335, which involves incorrect usage of seeds in the system's pseudo-random number generator (PRNG). Specifically, BRICS generates authentication tokens that are predictable because they are derived from a combination of the username, timestamp, and a fixed string "7Dl9#dj-". This deterministic token generation allows an attacker who possesses a Common Access Card (CAC) but is unauthenticated to predict or forge tokens. Consequently, such an attacker can escalate privileges and compromise any user account within the system, including those with administrative rights. The vulnerability arises due to weak entropy and predictable seed values in the PRNG, undermining the confidentiality and integrity of authentication tokens. Although no known exploits are currently reported in the wild, the flaw presents a significant risk given the sensitive nature of biomedical research data managed by BRICS. The vulnerability does not require prior authentication beyond possession of a CAC, and user interaction is not necessary, increasing the ease of exploitation. The lack of a patch at the time of reporting further exacerbates the risk.

Potential Impact

For European organizations involved in biomedical research, healthcare data management, or collaborative research projects with NIH or US-based institutions, this vulnerability poses a critical threat to data confidentiality and system integrity. Compromise of BRICS accounts, especially administrative ones, could lead to unauthorized access to sensitive patient data, research results, and intellectual property. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and loss of trust among research partners. Additionally, attackers could manipulate or delete research data, impacting the availability and reliability of biomedical studies. Given the collaborative nature of biomedical research, a breach in one institution could cascade, affecting multiple European research entities connected via BRICS. The ability to escalate privileges without authentication increases the risk of widespread compromise within affected networks.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to BRICS systems to trusted networks and users, implementing network-level controls such as VPNs and IP whitelisting. 2. Enforce multi-factor authentication (MFA) for all BRICS users, particularly administrators, to add an additional layer of security beyond token-based authentication. 3. Monitor authentication logs for unusual token generation patterns or repeated failed attempts that may indicate exploitation attempts. 4. Collaborate with NIH to prioritize the development and deployment of a patch that replaces the flawed PRNG implementation with a cryptographically secure random number generator seeded with high entropy sources. 5. Until a patch is available, consider implementing compensating controls such as session timeouts, token revocation mechanisms, and limiting the privileges associated with CAC holders. 6. Conduct regular security audits and penetration tests focusing on authentication mechanisms within BRICS. 7. Educate users about the risks of token compromise and encourage reporting of suspicious activity. 8. For organizations integrating BRICS with other systems, ensure that token validation and session management are robust and do not rely solely on BRICS-generated tokens.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-03T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf112d

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 4:41:33 AM

Last updated: 8/14/2025, 11:03:57 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats