Skip to main content

CVE-2025-3321: CWE-798 Use of Hard-coded Credentials in B. Braun Melsungen AG OnlineSuite

Critical
VulnerabilityCVE-2025-3321cvecve-2025-3321cwe-798
Published: Fri Jun 06 2025 (06/06/2025, 08:12:46 UTC)
Source: CVE Database V5
Vendor/Project: B. Braun Melsungen AG
Product: OnlineSuite

Description

A predefined administrative account is not documented and cannot be deactivated. This account cannot be misused from the network, only by local users on the server.

AI-Powered Analysis

AILast updated: 07/07/2025, 18:12:09 UTC

Technical Analysis

CVE-2025-3321 is a critical vulnerability identified in B. Braun Melsungen AG's OnlineSuite product, version 3.0. The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials. Specifically, the product contains a predefined administrative account that is undocumented and cannot be deactivated by users or administrators. This account exists locally on the server hosting the OnlineSuite application. Importantly, the vulnerability cannot be exploited remotely over the network; exploitation requires local access to the server. The CVSS 4.0 base score of 9.4 reflects the high severity, driven by the fact that the vulnerability impacts confidentiality, integrity, and availability with high scope and impact, and requires no privileges or user interaction to exploit once local access is obtained. The presence of an undeletable, undocumented administrative account means that any local attacker or malicious insider with access to the server can gain full administrative control over the OnlineSuite application, potentially leading to unauthorized data access, manipulation, or disruption of services. Although no known exploits are currently reported in the wild, the critical nature of the vulnerability and the high CVSS score indicate a significant risk if local access is compromised. The lack of available patches at the time of publication further increases the urgency for mitigation.

Potential Impact

For European organizations using B. Braun's OnlineSuite version 3.0, this vulnerability poses a significant risk, especially in environments where server physical or local access controls are weak. Given that OnlineSuite is likely used in healthcare or medical device management contexts (B. Braun being a medical technology company), exploitation could lead to unauthorized access to sensitive patient data, disruption of medical workflows, or manipulation of medical device configurations. This could result in violations of GDPR due to data breaches, potential harm to patients, and operational downtime. The inability to disable the hard-coded administrative account means that even trusted administrators cannot fully secure the system against local threats. European healthcare providers, hospitals, and clinics using this software are particularly at risk, as well as any organizations that rely on OnlineSuite for critical medical device management. The impact extends beyond data confidentiality to integrity and availability, potentially affecting patient safety and compliance with stringent European data protection and medical device regulations.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement strict physical and logical access controls to the servers running OnlineSuite 3.0 to prevent unauthorized local access. This includes securing server rooms, enforcing multi-factor authentication for server access, and monitoring local login attempts closely. Organizations should conduct thorough audits to identify any use of the undocumented administrative account and restrict its use where possible. Network segmentation can limit exposure by isolating the OnlineSuite servers from less trusted network segments. Additionally, organizations should engage with B. Braun to obtain guidance or interim mitigation measures and monitor for any forthcoming patches or updates. Employing host-based intrusion detection systems (HIDS) to detect unusual local activity and maintaining comprehensive logging will aid in early detection of exploitation attempts. Finally, organizations should prepare incident response plans specific to this vulnerability, including rapid isolation and forensic analysis capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
B.Braun
Date Reserved
2025-04-05T19:01:47.895Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842a32b182aa0cae2072843

Added to database: 6/6/2025, 8:13:31 AM

Last enriched: 7/7/2025, 6:12:09 PM

Last updated: 8/17/2025, 3:52:09 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats