Skip to main content

CVE-2025-27720: CWE-319 Cleartext Transmission of Sensitive Information in Pixmeo OsiriX MD

Critical
VulnerabilityCVE-2025-27720cvecve-2025-27720cwe-319
Published: Thu May 08 2025 (05/08/2025, 22:43:28 UTC)
Source: CVE
Vendor/Project: Pixmeo
Product: OsiriX MD

Description

The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.

AI-Powered Analysis

AILast updated: 07/05/2025, 03:11:34 UTC

Technical Analysis

CVE-2025-27720 is a critical vulnerability identified in the Pixmeo OsiriX MD Web Portal, a medical imaging software widely used for viewing and managing DICOM images. The vulnerability is categorized under CWE-319, which involves the cleartext transmission of sensitive information. Specifically, the OsiriX MD Web Portal transmits user credential information without encryption, exposing these credentials to interception by attackers through network sniffing or man-in-the-middle (MITM) attacks. The CVSS 4.0 score of 9.3 reflects the high severity, indicating that the vulnerability can be exploited remotely without any authentication or user interaction, and it affects confidentiality and integrity of sensitive data. The lack of encryption means that attackers can easily capture login credentials, potentially gaining unauthorized access to the medical imaging system. This could lead to unauthorized data access, manipulation, or further lateral movement within healthcare networks. Although no known exploits are currently reported in the wild, the vulnerability's nature and critical severity make it a significant risk, especially in environments where sensitive patient data is handled. The absence of a patch at the time of reporting further increases the urgency for mitigation.

Potential Impact

For European organizations, particularly healthcare providers and medical research institutions using OsiriX MD, this vulnerability poses a severe risk to patient data confidentiality and system integrity. Unauthorized access to medical imaging systems can lead to exposure of sensitive personal health information, violating GDPR requirements and potentially resulting in heavy regulatory penalties. Additionally, compromised credentials could allow attackers to alter or delete medical images, impacting clinical decisions and patient care. The vulnerability also increases the risk of broader network compromise if attackers leverage the access to move laterally within hospital IT infrastructure. Given the critical nature of healthcare services and the increasing reliance on digital medical records in Europe, exploitation of this vulnerability could disrupt healthcare delivery and erode patient trust.

Mitigation Recommendations

Immediate mitigation steps include implementing network-level protections such as enforcing the use of VPNs or secure tunnels (e.g., IPsec) to protect traffic between clients and the OsiriX MD Web Portal. Organizations should restrict access to the portal to trusted networks and monitor network traffic for signs of credential interception attempts. Deploying web application firewalls (WAFs) with rules to detect and block suspicious activities can provide additional defense. Since no official patch is available, organizations should engage with Pixmeo for timelines on remediation and consider temporary compensating controls such as disabling web portal access where feasible or requiring multi-factor authentication (MFA) to reduce the risk of compromised credentials being abused. Regularly auditing user access logs and conducting penetration testing focused on network traffic encryption can help identify and mitigate risks. Finally, educating users about the risks of using unsecured networks to access the portal is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-04-03T20:57:04.866Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7d73

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 3:11:34 AM

Last updated: 8/14/2025, 9:52:47 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats