CVE-2025-58742: CWE-522 Insufficiently Protected Credentials in Milner ImageDirector Capture
Insufficiently Protected Credentials, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Connection Settings dialog in Milner ImageDirector Capture on Windows allows Adversary in the Middle (AiTM) by modifying the 'Server' field to redirect client authentication.This issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.
AI Analysis
Technical Summary
CVE-2025-58742 is a vulnerability categorized under CWE-522 (Insufficiently Protected Credentials) and CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints) affecting Milner ImageDirector Capture on Windows platforms, specifically versions from 7.0.9 before 7.6.3.25808. The flaw resides in the Connection Settings dialog where the 'Server' field can be manipulated by an adversary with low privileges on the client machine. By altering this field, an attacker can redirect the client’s authentication attempts to a malicious server under their control, effectively enabling an Adversary-in-the-Middle (AiTM) attack. This redirection compromises the confidentiality of authentication credentials and potentially allows session hijacking or unauthorized access. The vulnerability requires no user interaction and has a low attack complexity, but does require some level of privilege (PR:L). The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality and availability, with high scope and integrity impacts as well. The vulnerability is particularly dangerous because it exploits insufficient validation and protection of communication endpoints, allowing attackers to intercept or manipulate authentication flows. No patches or exploits in the wild are currently documented, but the risk remains significant due to the nature of the credential exposure and the criticality of the affected product in medical imaging workflows.
Potential Impact
For European organizations, particularly those in healthcare and medical imaging sectors relying on Milner ImageDirector Capture, this vulnerability poses a significant risk of credential compromise and unauthorized access. The ability to redirect authentication to a malicious server can lead to data breaches involving sensitive patient information and disruption of imaging workflows. Confidentiality is severely impacted as credentials can be intercepted, and availability may be affected if attackers disrupt or manipulate authentication processes. The integrity of communications is also at risk, potentially allowing attackers to inject false data or commands. Given the critical role of imaging systems in diagnostics and treatment, exploitation could have downstream effects on patient care and regulatory compliance, including GDPR violations. The lack of user interaction required and the low complexity of exploitation increase the likelihood of successful attacks, especially in environments where endpoint security is not tightly controlled.
Mitigation Recommendations
Organizations should prioritize upgrading Milner ImageDirector Capture to versions 7.6.3.25808 or later once patches are released. Until then, restrict access to the Connection Settings dialog to trusted administrators only, preventing unauthorized modification of the 'Server' field. Implement strict network segmentation to isolate imaging devices and limit their communication to only trusted servers. Employ endpoint protection solutions that monitor and alert on unauthorized configuration changes or suspicious network redirections. Use network-level controls such as TLS inspection and certificate pinning where possible to detect and block attempts to redirect authentication traffic to untrusted endpoints. Conduct regular audits of device configurations and network traffic to identify anomalies. Additionally, educate IT staff and users about the risks of configuration tampering and enforce the principle of least privilege on affected systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-58742: CWE-522 Insufficiently Protected Credentials in Milner ImageDirector Capture
Description
Insufficiently Protected Credentials, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Connection Settings dialog in Milner ImageDirector Capture on Windows allows Adversary in the Middle (AiTM) by modifying the 'Server' field to redirect client authentication.This issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.
AI-Powered Analysis
Technical Analysis
CVE-2025-58742 is a vulnerability categorized under CWE-522 (Insufficiently Protected Credentials) and CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints) affecting Milner ImageDirector Capture on Windows platforms, specifically versions from 7.0.9 before 7.6.3.25808. The flaw resides in the Connection Settings dialog where the 'Server' field can be manipulated by an adversary with low privileges on the client machine. By altering this field, an attacker can redirect the client’s authentication attempts to a malicious server under their control, effectively enabling an Adversary-in-the-Middle (AiTM) attack. This redirection compromises the confidentiality of authentication credentials and potentially allows session hijacking or unauthorized access. The vulnerability requires no user interaction and has a low attack complexity, but does require some level of privilege (PR:L). The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality and availability, with high scope and integrity impacts as well. The vulnerability is particularly dangerous because it exploits insufficient validation and protection of communication endpoints, allowing attackers to intercept or manipulate authentication flows. No patches or exploits in the wild are currently documented, but the risk remains significant due to the nature of the credential exposure and the criticality of the affected product in medical imaging workflows.
Potential Impact
For European organizations, particularly those in healthcare and medical imaging sectors relying on Milner ImageDirector Capture, this vulnerability poses a significant risk of credential compromise and unauthorized access. The ability to redirect authentication to a malicious server can lead to data breaches involving sensitive patient information and disruption of imaging workflows. Confidentiality is severely impacted as credentials can be intercepted, and availability may be affected if attackers disrupt or manipulate authentication processes. The integrity of communications is also at risk, potentially allowing attackers to inject false data or commands. Given the critical role of imaging systems in diagnostics and treatment, exploitation could have downstream effects on patient care and regulatory compliance, including GDPR violations. The lack of user interaction required and the low complexity of exploitation increase the likelihood of successful attacks, especially in environments where endpoint security is not tightly controlled.
Mitigation Recommendations
Organizations should prioritize upgrading Milner ImageDirector Capture to versions 7.6.3.25808 or later once patches are released. Until then, restrict access to the Connection Settings dialog to trusted administrators only, preventing unauthorized modification of the 'Server' field. Implement strict network segmentation to isolate imaging devices and limit their communication to only trusted servers. Employ endpoint protection solutions that monitor and alert on unauthorized configuration changes or suspicious network redirections. Use network-level controls such as TLS inspection and certificate pinning where possible to detect and block attempts to redirect authentication traffic to untrusted endpoints. Conduct regular audits of device configurations and network traffic to identify anomalies. Additionally, educate IT staff and users about the risks of configuration tampering and enforce the principle of least privilege on affected systems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SRA
- Date Reserved
- 2025-09-04T15:27:48.361Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ff8c24623b1157c513d06
Added to database: 1/20/2026, 9:50:58 PM
Last enriched: 1/20/2026, 10:05:27 PM
Last updated: 2/6/2026, 5:44:54 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2059: SQL Injection in SourceCodester Medical Center Portal Management System
MediumCVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.