CVE-2025-30063: CWE-732 Incorrect Permission Assignment for Critical Resource in CGM CGM CLININET
The configuration file containing database logins and passwords is readable by any local user.
AI Analysis
Technical Summary
CVE-2025-30063 is a critical security vulnerability identified in the CGM CLININET product by CGM. The vulnerability is classified under CWE-732, which pertains to incorrect permission assignment for critical resources. Specifically, the issue involves a configuration file that contains sensitive database login credentials, including usernames and passwords, being accessible and readable by any local user on the system. This misconfiguration allows unauthorized local users to obtain database credentials without any authentication or user interaction. The CVSS 4.0 base score of 9.4 reflects the severity of this vulnerability, indicating it is critical. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope and impact metrics all rated high (H). Although no known exploits are currently reported in the wild, the ease of exploitation due to lack of required privileges and user interaction makes this a significant risk. The vulnerability could lead to unauthorized access to the database, potentially allowing attackers to exfiltrate sensitive patient data, modify records, or disrupt healthcare operations. Given that CGM CLININET is a healthcare information system, the exposure of database credentials poses a severe risk to patient privacy and system integrity.
Potential Impact
For European organizations, especially healthcare providers using CGM CLININET, this vulnerability presents a critical risk. Unauthorized local users gaining access to database credentials can lead to data breaches involving sensitive patient information, violating GDPR and other data protection regulations. The compromise of database credentials can also enable attackers to manipulate clinical data, potentially impacting patient care and safety. Furthermore, attackers could disrupt healthcare services by corrupting or deleting data, leading to operational downtime. The reputational damage and regulatory penalties resulting from such breaches could be substantial. Since healthcare systems are often targeted by cybercriminals and nation-state actors, the presence of this vulnerability increases the attack surface significantly. European healthcare institutions must consider the potential for insider threats or attackers gaining local access through other means (e.g., compromised accounts or lateral movement), which could then be leveraged to exploit this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-30063, organizations should immediately audit file system permissions on all CGM CLININET installations to ensure that configuration files containing sensitive credentials are restricted to the minimum necessary accounts, ideally only accessible by the application service account and system administrators. Implement strict access control lists (ACLs) and use operating system features such as mandatory access controls (e.g., SELinux, AppArmor) to enforce these restrictions. Employ encryption for configuration files where possible, so that even if accessed, credentials are not stored in plaintext. Additionally, rotate database credentials regularly and monitor access logs for unusual local file access patterns. Implement host-based intrusion detection systems (HIDS) to alert on unauthorized access attempts. If possible, isolate CGM CLININET systems in segmented network zones with strict local user account management policies to reduce the risk of unauthorized local access. Finally, coordinate with CGM for patches or configuration guidance, and apply any vendor updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-30063: CWE-732 Incorrect Permission Assignment for Critical Resource in CGM CGM CLININET
Description
The configuration file containing database logins and passwords is readable by any local user.
AI-Powered Analysis
Technical Analysis
CVE-2025-30063 is a critical security vulnerability identified in the CGM CLININET product by CGM. The vulnerability is classified under CWE-732, which pertains to incorrect permission assignment for critical resources. Specifically, the issue involves a configuration file that contains sensitive database login credentials, including usernames and passwords, being accessible and readable by any local user on the system. This misconfiguration allows unauthorized local users to obtain database credentials without any authentication or user interaction. The CVSS 4.0 base score of 9.4 reflects the severity of this vulnerability, indicating it is critical. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, with scope and impact metrics all rated high (H). Although no known exploits are currently reported in the wild, the ease of exploitation due to lack of required privileges and user interaction makes this a significant risk. The vulnerability could lead to unauthorized access to the database, potentially allowing attackers to exfiltrate sensitive patient data, modify records, or disrupt healthcare operations. Given that CGM CLININET is a healthcare information system, the exposure of database credentials poses a severe risk to patient privacy and system integrity.
Potential Impact
For European organizations, especially healthcare providers using CGM CLININET, this vulnerability presents a critical risk. Unauthorized local users gaining access to database credentials can lead to data breaches involving sensitive patient information, violating GDPR and other data protection regulations. The compromise of database credentials can also enable attackers to manipulate clinical data, potentially impacting patient care and safety. Furthermore, attackers could disrupt healthcare services by corrupting or deleting data, leading to operational downtime. The reputational damage and regulatory penalties resulting from such breaches could be substantial. Since healthcare systems are often targeted by cybercriminals and nation-state actors, the presence of this vulnerability increases the attack surface significantly. European healthcare institutions must consider the potential for insider threats or attackers gaining local access through other means (e.g., compromised accounts or lateral movement), which could then be leveraged to exploit this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-30063, organizations should immediately audit file system permissions on all CGM CLININET installations to ensure that configuration files containing sensitive credentials are restricted to the minimum necessary accounts, ideally only accessible by the application service account and system administrators. Implement strict access control lists (ACLs) and use operating system features such as mandatory access controls (e.g., SELinux, AppArmor) to enforce these restrictions. Employ encryption for configuration files where possible, so that even if accessed, credentials are not stored in plaintext. Additionally, rotate database credentials regularly and monitor access logs for unusual local file access patterns. Implement host-based intrusion detection systems (HIDS) to alert on unauthorized access attempts. If possible, isolate CGM CLININET systems in segmented network zones with strict local user account management policies to reduce the risk of unauthorized local access. Finally, coordinate with CGM for patches or configuration guidance, and apply any vendor updates promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-03-14T14:55:39.571Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68aeded4ad5a09ad006111c1
Added to database: 8/27/2025, 10:32:52 AM
Last enriched: 8/27/2025, 10:47:58 AM
Last updated: 8/27/2025, 1:32:51 PM
Views: 4
Related Threats
CVE-2025-53105: CWE-269: Improper Privilege Management in glpi-project glpi
HighCVE-2025-50986: n/a
UnknownCVE-2025-50985: n/a
UnknownCVE-2025-9533: Improper Authentication in TOTOLINK T10
MediumCVE-2025-52122: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.