Skip to main content

CVE-2025-35031: CWE-1295 Debug Messages Revealing Unnecessary Information in Medical Informatics Engineering Enterprise Health

Low
VulnerabilityCVE-2025-35031cvecve-2025-35031cwe-1295
Published: Mon Sep 29 2025 (09/29/2025, 20:00:42 UTC)
Source: CVE Database V5
Vendor/Project: Medical Informatics Engineering
Product: Enterprise Health

Description

Medical Informatics Engineering Enterprise Health includes the user's current session token in debug output. An attacker could convince a user to send this output to the attacker, thus allowing the attacker to impersonate that user. This issue is fixed as of 2025-04-08.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:12:55 UTC

Technical Analysis

CVE-2025-35031 is a security vulnerability identified in Medical Informatics Engineering's Enterprise Health software, specifically affecting versions RC202403, RC202409, and RC202503. The vulnerability arises from the inclusion of the user's current session token within debug output messages. This debug information, intended for troubleshooting, inadvertently exposes sensitive session tokens. An attacker could exploit this by tricking a legitimate user into sharing these debug messages, thereby gaining access to the user's session token. With this token, the attacker can impersonate the user within the Enterprise Health system, potentially accessing sensitive medical data or performing unauthorized actions. The vulnerability is classified under CWE-1295, which relates to debug messages revealing unnecessary information. The issue was addressed and fixed as of April 8, 2025. The CVSS v3.1 base score is 3.3, indicating a low severity level, primarily because exploitation requires local access (AV:L), no privileges (PR:N), but user interaction (UI:R) is necessary, and the impact is limited to confidentiality with no impact on integrity or availability.

Potential Impact

For European organizations, particularly healthcare providers and institutions using Medical Informatics Engineering's Enterprise Health platform, this vulnerability poses a risk to patient data confidentiality. If an attacker successfully convinces a user to share debug output containing session tokens, unauthorized access to sensitive health records could occur, potentially violating GDPR and other data protection regulations. Although the vulnerability requires user interaction and local access, the sensitive nature of healthcare data amplifies the potential damage. Unauthorized session hijacking could lead to data breaches, loss of patient trust, and regulatory penalties. However, the lack of integrity or availability impact and the low CVSS score suggest that the threat is limited in scope and exploitability, reducing the overall risk compared to more severe vulnerabilities.

Mitigation Recommendations

Organizations should ensure that all debug logging in Enterprise Health is disabled or properly sanitized in production environments to prevent exposure of sensitive session tokens. Specifically, administrators should update affected versions to the patched release dated April 8, 2025, or later. User training is critical to raise awareness about the risks of sharing debug output or any system-generated logs with untrusted parties. Implementing strict access controls and monitoring for unusual session activities can help detect potential misuse of session tokens. Additionally, enforcing short session lifetimes and multi-factor authentication can reduce the window of opportunity for attackers exploiting stolen tokens. Regular security audits and vulnerability scanning should include checks for debug information leakage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dae7e1c05da5c004a42954

Added to database: 9/29/2025, 8:11:13 PM

Last enriched: 9/29/2025, 8:12:55 PM

Last updated: 10/2/2025, 5:41:09 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats