Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30398: CWE-862: Missing Authorization in Microsoft Nuance PowerScribe 360 version 4.0.5

0
High
VulnerabilityCVE-2025-30398cvecve-2025-30398cwe-862
Published: Tue Nov 11 2025 (11/11/2025, 17:59:51 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Nuance PowerScribe 360 version 4.0.5

Description

Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:04:12 UTC

Technical Analysis

CVE-2025-30398 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Microsoft Nuance PowerScribe 360 version 4.0.5, a widely used radiology reporting software. The flaw arises because the software fails to enforce proper authorization checks, allowing an attacker without any privileges to access sensitive information over the network. The CVSS v3.1 score of 8.1 reflects a high-severity issue, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality and integrity is high (C:H/I:H), while availability is unaffected (A:N). This means an attacker can potentially exfiltrate or manipulate sensitive patient data remotely without authentication, posing a significant risk to data confidentiality and integrity. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for healthcare providers. The lack of available patches increases the urgency for interim mitigations. The vulnerability was publicly disclosed on November 11, 2025, with the issue reserved since March 2025. The affected product is primarily deployed in healthcare environments, where patient data privacy is paramount, making this vulnerability particularly sensitive. The requirement for user interaction suggests that exploitation might involve tricking a user into performing an action, such as clicking a link or opening a file, which could be leveraged in targeted phishing campaigns. Overall, this vulnerability represents a significant risk to the confidentiality and integrity of medical data handled by PowerScribe 360 installations.

Potential Impact

For European organizations, especially those in the healthcare sector, this vulnerability poses a severe risk to patient data confidentiality and integrity. Unauthorized disclosure of sensitive medical information can lead to privacy violations, regulatory penalties under GDPR, and loss of patient trust. The integrity impact means attackers could potentially alter diagnostic reports, leading to misdiagnosis or improper treatment. Since the vulnerability can be exploited remotely over the network without privileges, it increases the attack surface significantly. The requirement for user interaction suggests phishing or social engineering could be vectors, which are common attack methods in Europe. The absence of patches means organizations must rely on compensating controls, increasing operational complexity. Healthcare providers in Europe are heavily regulated and must ensure compliance with strict data protection laws, making this vulnerability particularly critical. Additionally, disruption or manipulation of medical data can have direct consequences on patient safety, elevating the threat beyond typical data breaches. The impact extends to healthcare IT infrastructure, potentially affecting trust in digital health services and increasing costs related to incident response and remediation.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate Nuance PowerScribe 360 servers from untrusted networks and limit access to only essential personnel and systems. 2. Employ strict access controls and monitor all network traffic to and from the affected systems for unusual or unauthorized access attempts. 3. Educate users on phishing and social engineering risks to reduce the likelihood of user interaction exploitation. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous behavior related to PowerScribe 360. 5. Restrict exposure of the affected software to the internet or external networks; use VPNs or secure tunnels for remote access. 6. Maintain comprehensive logging and audit trails to facilitate rapid detection and forensic analysis in case of exploitation. 7. Coordinate with Microsoft and Nuance for timely updates and patches; prepare to apply them immediately upon release. 8. Conduct regular vulnerability assessments and penetration testing focusing on authorization controls within healthcare applications. 9. Consider implementing data encryption at rest and in transit to mitigate data disclosure risks. 10. Develop and rehearse incident response plans specific to healthcare data breaches involving diagnostic systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4747ab3590319da053

Added to database: 11/11/2025, 6:11:19 PM

Last enriched: 1/2/2026, 11:04:12 PM

Last updated: 1/7/2026, 8:55:05 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats