Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35032: CWE-434 Unrestricted Upload of File with Dangerous Type in Medical Informatics Engineering Enterprise Health

0
Low
VulnerabilityCVE-2025-35032cvecve-2025-35032cwe-434
Published: Mon Sep 29 2025 (09/29/2025, 20:01:09 UTC)
Source: CVE Database V5
Vendor/Project: Medical Informatics Engineering
Product: Enterprise Health

Description

Medical Informatics Engineering Enterprise Health allows authenticated users to upload arbitrary files. The impact of this behavior depends on how files are accessed. This issue is fixed as of 2025-04-08.

AI-Powered Analysis

AILast updated: 10/07/2025, 00:45:05 UTC

Technical Analysis

CVE-2025-35032 is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The vulnerability exists in Medical Informatics Engineering's Enterprise Health software, a healthcare information system used to manage patient data and clinical workflows. Authenticated users can upload arbitrary files without adequate validation or restriction on file types, potentially allowing the introduction of malicious or unauthorized files into the system. The impact of this vulnerability depends heavily on how the uploaded files are subsequently accessed or executed within the environment. For example, if uploaded files are stored in web-accessible directories or processed by backend services without proper sanitization, attackers could leverage this to alter system behavior or facilitate further attacks. However, the CVSS score of 3.4 indicates a low severity, primarily because exploitation requires authentication (PR:H) and user interaction (UI:R), and the vulnerability does not directly compromise confidentiality or availability but may affect integrity to a limited extent. The scope is considered changed (S:C), meaning the vulnerability could affect components beyond the initially vulnerable module. No known exploits have been reported in the wild, and the vendor addressed the issue with a patch released on April 8, 2025. Given the critical nature of healthcare data and systems, even low-severity vulnerabilities warrant attention to prevent escalation or chaining with other vulnerabilities.

Potential Impact

For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health, this vulnerability poses a risk of unauthorized file uploads that could undermine data integrity or enable further exploitation if combined with other vulnerabilities. While the direct impact is limited, the healthcare environment's sensitivity means that any compromise could affect patient data trustworthiness or system reliability. The requirement for authentication and user interaction reduces the risk of widespread exploitation but does not eliminate insider threats or targeted attacks by malicious insiders or compromised accounts. Disruption or manipulation of healthcare records could have serious consequences for patient care and regulatory compliance under GDPR and other healthcare data protection laws. Additionally, healthcare providers in Europe are high-value targets for cybercriminals and nation-state actors, increasing the importance of timely remediation.

Mitigation Recommendations

1. Apply the vendor-provided patch released on April 8, 2025, immediately to remediate the vulnerability. 2. Implement strict file type validation and sanitization on all file uploads to restrict dangerous file types and ensure only expected formats are accepted. 3. Enforce the principle of least privilege for user accounts to minimize the risk posed by compromised or malicious authenticated users. 4. Monitor file upload logs and system behavior for unusual activity indicative of exploitation attempts or unauthorized file uploads. 5. Conduct regular security assessments and penetration testing focused on file upload functionalities. 6. Educate users about the risks associated with file uploads and the importance of following security policies. 7. Isolate file storage locations from web-accessible directories and ensure uploaded files cannot be executed or served directly without validation. 8. Integrate application-layer security controls such as web application firewalls (WAFs) to detect and block suspicious upload attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dae7e1c05da5c004a42958

Added to database: 9/29/2025, 8:11:13 PM

Last enriched: 10/7/2025, 12:45:05 AM

Last updated: 11/17/2025, 12:50:33 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats