CVE-2025-27720: CWE-319 Cleartext Transmission of Sensitive Information in Pixmeo OsiriX MD
The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.
AI Analysis
Technical Summary
CVE-2025-27720 is a critical vulnerability identified in the Pixmeo OsiriX MD Web Portal, a medical imaging software widely used for viewing and managing DICOM images. The vulnerability is categorized under CWE-319, which involves the cleartext transmission of sensitive information. Specifically, the OsiriX MD Web Portal transmits user credential information without encryption, exposing these credentials to interception by attackers through network sniffing or man-in-the-middle (MITM) attacks. The CVSS 4.0 score of 9.3 reflects the high severity, indicating that the vulnerability can be exploited remotely without any authentication or user interaction, and it affects confidentiality and integrity of sensitive data. The lack of encryption means that attackers can easily capture login credentials, potentially gaining unauthorized access to the medical imaging system. This could lead to unauthorized data access, manipulation, or further lateral movement within healthcare networks. Although no known exploits are currently reported in the wild, the vulnerability's nature and critical severity make it a significant risk, especially in environments where sensitive patient data is handled. The absence of a patch at the time of reporting further increases the urgency for mitigation.
Potential Impact
For European organizations, particularly healthcare providers and medical research institutions using OsiriX MD, this vulnerability poses a severe risk to patient data confidentiality and system integrity. Unauthorized access to medical imaging systems can lead to exposure of sensitive personal health information, violating GDPR requirements and potentially resulting in heavy regulatory penalties. Additionally, compromised credentials could allow attackers to alter or delete medical images, impacting clinical decisions and patient care. The vulnerability also increases the risk of broader network compromise if attackers leverage the access to move laterally within hospital IT infrastructure. Given the critical nature of healthcare services and the increasing reliance on digital medical records in Europe, exploitation of this vulnerability could disrupt healthcare delivery and erode patient trust.
Mitigation Recommendations
Immediate mitigation steps include implementing network-level protections such as enforcing the use of VPNs or secure tunnels (e.g., IPsec) to protect traffic between clients and the OsiriX MD Web Portal. Organizations should restrict access to the portal to trusted networks and monitor network traffic for signs of credential interception attempts. Deploying web application firewalls (WAFs) with rules to detect and block suspicious activities can provide additional defense. Since no official patch is available, organizations should engage with Pixmeo for timelines on remediation and consider temporary compensating controls such as disabling web portal access where feasible or requiring multi-factor authentication (MFA) to reduce the risk of compromised credentials being abused. Regularly auditing user access logs and conducting penetration testing focused on network traffic encryption can help identify and mitigate risks. Finally, educating users about the risks of using unsecured networks to access the portal is essential.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Switzerland, Austria
CVE-2025-27720: CWE-319 Cleartext Transmission of Sensitive Information in Pixmeo OsiriX MD
Description
The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-27720 is a critical vulnerability identified in the Pixmeo OsiriX MD Web Portal, a medical imaging software widely used for viewing and managing DICOM images. The vulnerability is categorized under CWE-319, which involves the cleartext transmission of sensitive information. Specifically, the OsiriX MD Web Portal transmits user credential information without encryption, exposing these credentials to interception by attackers through network sniffing or man-in-the-middle (MITM) attacks. The CVSS 4.0 score of 9.3 reflects the high severity, indicating that the vulnerability can be exploited remotely without any authentication or user interaction, and it affects confidentiality and integrity of sensitive data. The lack of encryption means that attackers can easily capture login credentials, potentially gaining unauthorized access to the medical imaging system. This could lead to unauthorized data access, manipulation, or further lateral movement within healthcare networks. Although no known exploits are currently reported in the wild, the vulnerability's nature and critical severity make it a significant risk, especially in environments where sensitive patient data is handled. The absence of a patch at the time of reporting further increases the urgency for mitigation.
Potential Impact
For European organizations, particularly healthcare providers and medical research institutions using OsiriX MD, this vulnerability poses a severe risk to patient data confidentiality and system integrity. Unauthorized access to medical imaging systems can lead to exposure of sensitive personal health information, violating GDPR requirements and potentially resulting in heavy regulatory penalties. Additionally, compromised credentials could allow attackers to alter or delete medical images, impacting clinical decisions and patient care. The vulnerability also increases the risk of broader network compromise if attackers leverage the access to move laterally within hospital IT infrastructure. Given the critical nature of healthcare services and the increasing reliance on digital medical records in Europe, exploitation of this vulnerability could disrupt healthcare delivery and erode patient trust.
Mitigation Recommendations
Immediate mitigation steps include implementing network-level protections such as enforcing the use of VPNs or secure tunnels (e.g., IPsec) to protect traffic between clients and the OsiriX MD Web Portal. Organizations should restrict access to the portal to trusted networks and monitor network traffic for signs of credential interception attempts. Deploying web application firewalls (WAFs) with rules to detect and block suspicious activities can provide additional defense. Since no official patch is available, organizations should engage with Pixmeo for timelines on remediation and consider temporary compensating controls such as disabling web portal access where feasible or requiring multi-factor authentication (MFA) to reduce the risk of compromised credentials being abused. Regularly auditing user access logs and conducting penetration testing focused on network traffic encryption can help identify and mitigate risks. Finally, educating users about the risks of using unsecured networks to access the portal is essential.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-04-03T20:57:04.866Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7d73
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 3:11:34 AM
Last updated: 11/21/2025, 2:17:07 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
HighCVE-2025-64755: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-62426: CWE-770: Allocation of Resources Without Limits or Throttling in vllm-project vllm
MediumCVE-2025-62372: CWE-129: Improper Validation of Array Index in vllm-project vllm
HighCVE-2025-62164: CWE-20: Improper Input Validation in vllm-project vllm
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.