Skip to main content

CVE-2025-54156: CWE-319 Cleartext Transmission of Sensitive Information in Santesoft Sante PACS Server

Critical
VulnerabilityCVE-2025-54156cvecve-2025-54156cwe-319
Published: Mon Aug 18 2025 (08/18/2025, 21:21:38 UTC)
Source: CVE Database V5
Vendor/Project: Santesoft
Product: Sante PACS Server

Description

The Sante PACS Server Web Portal sends credential information without encryption.

AI-Powered Analysis

AILast updated: 08/26/2025, 01:31:33 UTC

Technical Analysis

CVE-2025-54156 is a critical vulnerability identified in the Santesoft Sante PACS Server, specifically affecting its Web Portal component. The vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive information. In this case, the server transmits credential information without encryption, exposing sensitive authentication data such as usernames and passwords over the network in plaintext. This flaw allows an attacker with network access to intercept these credentials via man-in-the-middle (MitM) attacks or passive network sniffing. The vulnerability has a CVSS 4.0 base score of 9.1, indicating a critical severity level. The vector metrics indicate that the attack can be performed remotely (AV:N) without user interaction (UI:N) or privileges (PR:N), but requires high attack complexity (AC:H). The vulnerability impacts confidentiality and integrity of credentials, potentially leading to unauthorized access to the PACS server and the sensitive medical imaging data it manages. The lack of encryption in credential transmission violates best practices for secure communications, such as the use of TLS/SSL. No patches or known exploits in the wild have been reported yet, but the critical nature of the vulnerability and the sensitivity of the data involved make it a significant security risk.

Potential Impact

For European organizations, especially healthcare providers and medical facilities using the Sante PACS Server, this vulnerability poses a severe risk. PACS (Picture Archiving and Communication System) servers store and manage sensitive patient imaging data, which is subject to strict data protection regulations such as the EU GDPR. Exposure of credentials could lead to unauthorized access, data breaches, and potential manipulation or theft of protected health information (PHI). This could result in significant legal and financial consequences, including fines and reputational damage. Additionally, compromised PACS servers could be used as entry points for further attacks within healthcare networks, threatening the availability and integrity of critical medical services. The vulnerability's exploitation could disrupt clinical workflows and patient care, impacting public health and safety.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately assess their use of the Sante PACS Server Web Portal and verify whether credential transmissions are encrypted. If possible, disable the vulnerable web portal or restrict its network exposure until a patch is available. Network segmentation and the use of VPNs can reduce exposure to potential attackers. Implementing network monitoring to detect unusual traffic patterns or credential interception attempts is advisable. Organizations should enforce strong access controls and multi-factor authentication (MFA) where supported to reduce the impact of credential compromise. It is critical to engage with the vendor, Santesoft, to obtain patches or updates that enforce encrypted transmission (e.g., TLS 1.2 or higher). In the interim, consider deploying web application firewalls (WAFs) and intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts. Regular security audits and penetration testing focused on network communications of the PACS server should be conducted to identify and remediate similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-08-05T22:22:55.575Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a39bfcad5a09ad00df5d78

Added to database: 8/18/2025, 9:32:44 PM

Last enriched: 8/26/2025, 1:31:33 AM

Last updated: 10/2/2025, 3:37:55 PM

Views: 51

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats