CVE-2025-27580: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in NIH BRICS
NIH BRICS (aka Biomedical Research Informatics Computing System) through 14.0.0-67 generates predictable tokens (that depend on username, time, and the fixed 7Dl9#dj- string) and thus allows unauthenticated users with a Common Access Card (CAC) to escalate privileges and compromise any account, including administrators.
AI Analysis
Technical Summary
CVE-2025-27580 is a vulnerability in the NIH Biomedical Research Informatics Computing System (BRICS) up to version 14.0.0-67. The core issue stems from CWE-335, which involves incorrect usage of seeds in the system's pseudo-random number generator (PRNG). Specifically, BRICS generates authentication tokens that are predictable because they are derived from a combination of the username, timestamp, and a fixed string "7Dl9#dj-". This deterministic token generation allows an attacker who possesses a Common Access Card (CAC) but is unauthenticated to predict or forge tokens. Consequently, such an attacker can escalate privileges and compromise any user account within the system, including those with administrative rights. The vulnerability arises due to weak entropy and predictable seed values in the PRNG, undermining the confidentiality and integrity of authentication tokens. Although no known exploits are currently reported in the wild, the flaw presents a significant risk given the sensitive nature of biomedical research data managed by BRICS. The vulnerability does not require prior authentication beyond possession of a CAC, and user interaction is not necessary, increasing the ease of exploitation. The lack of a patch at the time of reporting further exacerbates the risk.
Potential Impact
For European organizations involved in biomedical research, healthcare data management, or collaborative research projects with NIH or US-based institutions, this vulnerability poses a critical threat to data confidentiality and system integrity. Compromise of BRICS accounts, especially administrative ones, could lead to unauthorized access to sensitive patient data, research results, and intellectual property. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and loss of trust among research partners. Additionally, attackers could manipulate or delete research data, impacting the availability and reliability of biomedical studies. Given the collaborative nature of biomedical research, a breach in one institution could cascade, affecting multiple European research entities connected via BRICS. The ability to escalate privileges without authentication increases the risk of widespread compromise within affected networks.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to BRICS systems to trusted networks and users, implementing network-level controls such as VPNs and IP whitelisting. 2. Enforce multi-factor authentication (MFA) for all BRICS users, particularly administrators, to add an additional layer of security beyond token-based authentication. 3. Monitor authentication logs for unusual token generation patterns or repeated failed attempts that may indicate exploitation attempts. 4. Collaborate with NIH to prioritize the development and deployment of a patch that replaces the flawed PRNG implementation with a cryptographically secure random number generator seeded with high entropy sources. 5. Until a patch is available, consider implementing compensating controls such as session timeouts, token revocation mechanisms, and limiting the privileges associated with CAC holders. 6. Conduct regular security audits and penetration tests focusing on authentication mechanisms within BRICS. 7. Educate users about the risks of token compromise and encourage reporting of suspicious activity. 8. For organizations integrating BRICS with other systems, ensure that token validation and session management are robust and do not rely solely on BRICS-generated tokens.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain, Switzerland, Denmark
CVE-2025-27580: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in NIH BRICS
Description
NIH BRICS (aka Biomedical Research Informatics Computing System) through 14.0.0-67 generates predictable tokens (that depend on username, time, and the fixed 7Dl9#dj- string) and thus allows unauthenticated users with a Common Access Card (CAC) to escalate privileges and compromise any account, including administrators.
AI-Powered Analysis
Technical Analysis
CVE-2025-27580 is a vulnerability in the NIH Biomedical Research Informatics Computing System (BRICS) up to version 14.0.0-67. The core issue stems from CWE-335, which involves incorrect usage of seeds in the system's pseudo-random number generator (PRNG). Specifically, BRICS generates authentication tokens that are predictable because they are derived from a combination of the username, timestamp, and a fixed string "7Dl9#dj-". This deterministic token generation allows an attacker who possesses a Common Access Card (CAC) but is unauthenticated to predict or forge tokens. Consequently, such an attacker can escalate privileges and compromise any user account within the system, including those with administrative rights. The vulnerability arises due to weak entropy and predictable seed values in the PRNG, undermining the confidentiality and integrity of authentication tokens. Although no known exploits are currently reported in the wild, the flaw presents a significant risk given the sensitive nature of biomedical research data managed by BRICS. The vulnerability does not require prior authentication beyond possession of a CAC, and user interaction is not necessary, increasing the ease of exploitation. The lack of a patch at the time of reporting further exacerbates the risk.
Potential Impact
For European organizations involved in biomedical research, healthcare data management, or collaborative research projects with NIH or US-based institutions, this vulnerability poses a critical threat to data confidentiality and system integrity. Compromise of BRICS accounts, especially administrative ones, could lead to unauthorized access to sensitive patient data, research results, and intellectual property. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and loss of trust among research partners. Additionally, attackers could manipulate or delete research data, impacting the availability and reliability of biomedical studies. Given the collaborative nature of biomedical research, a breach in one institution could cascade, affecting multiple European research entities connected via BRICS. The ability to escalate privileges without authentication increases the risk of widespread compromise within affected networks.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to BRICS systems to trusted networks and users, implementing network-level controls such as VPNs and IP whitelisting. 2. Enforce multi-factor authentication (MFA) for all BRICS users, particularly administrators, to add an additional layer of security beyond token-based authentication. 3. Monitor authentication logs for unusual token generation patterns or repeated failed attempts that may indicate exploitation attempts. 4. Collaborate with NIH to prioritize the development and deployment of a patch that replaces the flawed PRNG implementation with a cryptographically secure random number generator seeded with high entropy sources. 5. Until a patch is available, consider implementing compensating controls such as session timeouts, token revocation mechanisms, and limiting the privileges associated with CAC holders. 6. Conduct regular security audits and penetration tests focusing on authentication mechanisms within BRICS. 7. Educate users about the risks of token compromise and encourage reporting of suspicious activity. 8. For organizations integrating BRICS with other systems, ensure that token validation and session management are robust and do not rely solely on BRICS-generated tokens.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-03T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf112d
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 4:41:33 AM
Last updated: 8/14/2025, 11:03:57 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.