Skip to main content

CVE-2025-54156: CWE-319 Cleartext Transmission of Sensitive Information in Santesoft Sante PACS Server

Critical
VulnerabilityCVE-2025-54156cvecve-2025-54156cwe-319
Published: Mon Aug 18 2025 (08/18/2025, 21:21:38 UTC)
Source: CVE Database V5
Vendor/Project: Santesoft
Product: Sante PACS Server

Description

The Sante PACS Server Web Portal sends credential information without encryption.

AI-Powered Analysis

AILast updated: 08/18/2025, 21:48:22 UTC

Technical Analysis

CVE-2025-54156 is a critical vulnerability identified in the Santesoft Sante PACS Server, specifically affecting its Web Portal component. The vulnerability is categorized under CWE-319, which pertains to the cleartext transmission of sensitive information. In this case, the Sante PACS Server Web Portal transmits credential information without encryption, exposing sensitive authentication data such as usernames and passwords to potential interception by attackers. The CVSS 4.0 base score of 9.1 reflects the high severity of this issue, indicating a network attack vector (AV:N) with high impact on confidentiality and integrity (VC:H, VI:H), no privileges or user interaction required (PR:N, UI:N), and no scope change (S:U). The vulnerability does not require authentication or user interaction, making it easier for remote attackers to exploit by simply intercepting network traffic between clients and the server. The lack of encryption means that any attacker with network access, including those on the same local network or capable of performing man-in-the-middle attacks, can capture credentials in transit. This can lead to unauthorized access to the PACS system, which stores and manages sensitive medical imaging data. Although no known exploits are currently reported in the wild, the critical nature of the vulnerability and the sensitivity of the data involved make it a significant risk. The affected product version is listed as '0', which likely indicates an initial or default version affected, suggesting that all current deployments of the Sante PACS Server Web Portal may be vulnerable unless patched or mitigated. No patches are currently linked, indicating that remediation may require vendor intervention or temporary mitigations.

Potential Impact

For European organizations, especially healthcare providers and medical imaging centers using the Sante PACS Server, this vulnerability poses a severe risk to patient data confidentiality and system integrity. The interception of unencrypted credentials could lead to unauthorized access to medical imaging records, violating GDPR regulations concerning personal health information and potentially resulting in significant legal and financial penalties. Compromise of the PACS system could also disrupt clinical workflows, delaying diagnosis and treatment. Given the criticality of healthcare infrastructure and the sensitivity of the data, exploitation could undermine patient trust and damage organizational reputation. Furthermore, attackers gaining access through this vulnerability could potentially move laterally within hospital networks, escalating the impact beyond the PACS system itself. The absence of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks if network defenses are inadequate.

Mitigation Recommendations

Immediate mitigation should focus on securing the transmission channel by enforcing encryption protocols such as TLS for all communications involving the Sante PACS Server Web Portal. Network administrators should implement network segmentation and restrict access to the PACS server to trusted hosts only, minimizing exposure to untrusted networks. Deploying network monitoring and intrusion detection systems to identify unusual traffic patterns or credential interception attempts is advisable. If vendor patches become available, prompt application is critical. In the interim, organizations should consider using VPNs or secure tunnels for remote access to the PACS system to protect credentials in transit. Additionally, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) can reduce the risk of compromised credentials leading to unauthorized access. Regular security audits and penetration testing focused on network communications can help identify and remediate similar weaknesses. Finally, staff training on secure handling of credentials and awareness of phishing or man-in-the-middle attack vectors will complement technical controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-08-05T22:22:55.575Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a39bfcad5a09ad00df5d78

Added to database: 8/18/2025, 9:32:44 PM

Last enriched: 8/18/2025, 9:48:22 PM

Last updated: 8/19/2025, 1:04:56 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats