Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53912: CWE-73: External Control of File Name or Path in MedDream MedDream PACS Premium

0
Critical
VulnerabilityCVE-2025-53912cvecve-2025-53912cwe-73
Published: Tue Jan 20 2026 (01/20/2026, 14:49:33 UTC)
Source: CVE Database V5
Vendor/Project: MedDream
Product: MedDream PACS Premium

Description

An arbitrary file read vulnerability exists in the encapsulatedDoc functionality of MedDream PACS Premium 7.3.6.870. A specially crafted HTTP request can lead to an arbitrary file read. An attacker can send http request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 01/20/2026, 15:20:50 UTC

Technical Analysis

CVE-2025-53912 is an arbitrary file read vulnerability classified under CWE-73 (External Control of File Name or Path) affecting MedDream PACS Premium version 7.3.6.870. The flaw exists in the encapsulatedDoc functionality, which improperly handles user-supplied input controlling file paths. An attacker can send a specially crafted HTTP request to the vulnerable endpoint, causing the application to read and disclose arbitrary files from the server's filesystem. This can lead to unauthorized disclosure of sensitive information, including patient data and system configuration files. The vulnerability has a CVSS v3.1 base score of 9.6, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality and integrity is high, while availability is not affected. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a high-risk issue. The vulnerability was reserved in August 2025 and published in January 2026. MedDream PACS Premium is a widely used Picture Archiving and Communication System in healthcare environments, making this vulnerability particularly concerning for medical institutions.

Potential Impact

For European organizations, especially healthcare providers, this vulnerability poses a significant risk of unauthorized access to sensitive patient data, violating GDPR and other data protection laws. Exposure of medical images, patient records, and system credentials could lead to privacy breaches, reputational damage, and regulatory penalties. The integrity of medical data could be compromised if attackers manipulate or exfiltrate files. Given the critical nature of healthcare services, such breaches could disrupt clinical workflows and patient care indirectly. The vulnerability's network accessibility and low complexity increase the likelihood of exploitation, potentially by insider threats or external attackers with limited privileges. This could also facilitate lateral movement within healthcare networks, escalating the overall risk posture. European healthcare institutions are prime targets due to their reliance on PACS systems and the high value of medical data on the black market.

Mitigation Recommendations

1. Apply official patches or updates from MedDream as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict network access to the PACS system, especially the encapsulatedDoc functionality, using network segmentation and firewall rules. 3. Implement strict input validation and sanitization on all user-supplied parameters controlling file paths to prevent path traversal or arbitrary file access. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting file path parameters. 5. Conduct regular security audits and penetration testing focused on file handling functionalities within PACS systems. 6. Monitor system logs for unusual file access patterns or repeated failed attempts to access unauthorized files. 7. Educate system administrators and users about the risks and signs of exploitation attempts. 8. Consider deploying endpoint detection and response (EDR) solutions to detect lateral movement or data exfiltration attempts post-compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-22T16:43:01.671Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f99d64623b1157c3aa458

Added to database: 1/20/2026, 3:05:58 PM

Last enriched: 1/20/2026, 3:20:50 PM

Last updated: 1/20/2026, 7:34:22 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats