Skip to main content

CVE-2025-30040: CWE-306 Missing Authentication for Critical Function in CGM CGM CLININET

Critical
VulnerabilityCVE-2025-30040cvecve-2025-30040cwe-306
Published: Wed Aug 27 2025 (08/27/2025, 10:21:17 UTC)
Source: CVE Database V5
Vendor/Project: CGM
Product: CGM CLININET

Description

The vulnerability allows unauthenticated users to download a file containing session ID data by directly accessing the "/cgi-bin/CliniNET.prd/utils/userlogxls.pl" endpoint.

AI-Powered Analysis

AILast updated: 08/27/2025, 10:49:07 UTC

Technical Analysis

CVE-2025-30040 is a critical vulnerability identified in the CGM CLININET product developed by CGM. The vulnerability is classified under CWE-306, which pertains to missing authentication for critical functions. Specifically, this flaw allows unauthenticated users to directly access the endpoint "/cgi-bin/CliniNET.prd/utils/userlogxls.pl" without any authentication checks. By exploiting this endpoint, an attacker can download a file containing session ID data. Session IDs are sensitive tokens used to maintain authenticated sessions between users and the application. Exposure of these tokens can lead to session hijacking, allowing attackers to impersonate legitimate users, potentially gaining unauthorized access to sensitive patient data or administrative functions within the healthcare system. The vulnerability has a CVSS 4.0 base score of 9, indicating a critical severity level. The vector details show that the attack can be performed remotely (Attack Vector: Adjacent Network), with low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, and the scope is changed, meaning exploitation can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the criticality of the exposed data make it a significant risk. CGM CLININET is a clinical information system widely used in healthcare environments to manage patient data and clinical workflows. The exposure of session IDs can lead to unauthorized access to patient records, modification of clinical data, and disruption of healthcare services, which can have severe consequences for patient safety and privacy.

Potential Impact

For European organizations, particularly healthcare providers using CGM CLININET, this vulnerability poses a severe risk. Unauthorized access to session IDs can lead to session hijacking, allowing attackers to bypass authentication and access sensitive patient information. This compromises patient confidentiality and violates data protection regulations such as the EU's GDPR, potentially resulting in significant legal and financial penalties. Furthermore, attackers could alter clinical data, impacting the integrity of patient records and potentially leading to incorrect medical decisions. Availability may also be affected if attackers disrupt system operations or cause denial of service through unauthorized access. Given the critical role of healthcare IT systems, exploitation could undermine trust in healthcare providers and disrupt essential medical services across Europe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the "/cgi-bin/CliniNET.prd/utils/userlogxls.pl" endpoint by implementing proper authentication and authorization controls. This includes enforcing strong access control mechanisms such as multi-factor authentication for accessing sensitive endpoints. Network segmentation should be applied to limit access to the CGM CLININET system only to trusted internal networks and authorized personnel. Monitoring and logging access to this endpoint should be enhanced to detect any unauthorized attempts. Since no patch links are currently available, organizations should engage with CGM for urgent security updates or workarounds. Additionally, session management practices should be reviewed and strengthened, including session expiration and token invalidation upon logout. Conducting a thorough security audit of the CGM CLININET deployment and applying compensating controls such as Web Application Firewalls (WAF) to block unauthorized requests to the vulnerable endpoint is recommended until a patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-03-14T14:54:23.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aeded3ad5a09ad00611199

Added to database: 8/27/2025, 10:32:51 AM

Last enriched: 8/27/2025, 10:49:07 AM

Last updated: 9/3/2025, 10:26:04 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats