Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61940: CWE-603 in Mirion Medical EC2 Software NMIS BioDose

0
High
VulnerabilityCVE-2025-61940cvecve-2025-61940cwe-603
Published: Tue Dec 02 2025 (12/02/2025, 21:07:47 UTC)
Source: CVE Database V5
Vendor/Project: Mirion Medical
Product: EC2 Software NMIS BioDose

Description

NMIS/BioDose V22.02 and previous versions rely on a common SQL Server user account to access data in the database. User access in the client application is restricted by a password authentication check in the client software but the underlying database connection always has access. The latest version of NMIS/BioDose introduces an option to use Windows user authentication with the database, which would restrict this database connection.

AI-Powered Analysis

AILast updated: 12/09/2025, 21:58:40 UTC

Technical Analysis

CVE-2025-61940 is a vulnerability classified under CWE-603 (Use of Client-Side Authentication) affecting Mirion Medical's EC2 Software NMIS BioDose, specifically version 22.02 and prior. The core issue lies in the software's reliance on a shared SQL Server user account for database access, where the client application enforces user authentication via password checks, but the underlying database connection credentials remain constant and broadly permissive. This architectural flaw means that once an attacker gains access to the client application environment, they can bypass client-side authentication and directly interact with the database using the shared credentials, potentially leading to unauthorized data access or modification. The vulnerability does not require user interaction or elevated privileges beyond local access, and the attack vector is network-based with low complexity. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) reflects high confidentiality and integrity impacts, with limited availability impact and no scope change. The vendor has addressed this issue in the latest NMIS/BioDose version by introducing an option for Windows user authentication, which ties database access to individual Windows user accounts, thereby restricting unauthorized database connections. No known exploits are currently reported in the wild, but the vulnerability's nature and impact warrant urgent attention, especially in environments handling sensitive medical data.

Potential Impact

For European organizations, particularly those in healthcare, medical research, and radiation safety sectors using Mirion Medical's NMIS BioDose software, this vulnerability poses significant risks. Unauthorized access to the database could lead to exposure or manipulation of sensitive patient data, radiation dose records, or compliance-related information, potentially violating GDPR and other data protection regulations. Integrity breaches could result in inaccurate dose measurements or reports, impacting patient safety and regulatory compliance. The ease of exploitation without user interaction or elevated privileges increases the threat level, especially in environments where endpoint security or network segmentation is insufficient. Disruption or data tampering could also undermine trust in medical devices and software, leading to operational and reputational damage. Given the critical nature of medical data and regulatory scrutiny in Europe, the impact extends beyond technical compromise to legal and financial consequences.

Mitigation Recommendations

European organizations should prioritize upgrading to the latest NMIS/BioDose version that supports Windows user authentication to enforce per-user database access controls. Until upgrades are applied, restrict network access to the SQL Server instance hosting the NMIS/BioDose database using firewalls and network segmentation to limit exposure. Implement strict access controls on client machines running the software, including endpoint protection and least privilege principles to reduce the risk of local compromise. Monitor database access logs for unusual activity indicative of unauthorized access attempts. Consider deploying database activity monitoring tools to detect and alert on anomalous queries or connections. Conduct regular audits of user accounts and credentials used by the software to ensure no unauthorized sharing or leakage. Engage with Mirion Medical support for any available patches or workarounds and maintain awareness of emerging exploit reports. Finally, integrate this vulnerability into incident response plans to enable rapid containment if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:56:52.843Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f572b3b1ed793e36e7581

Added to database: 12/2/2025, 9:16:27 PM

Last enriched: 12/9/2025, 9:58:40 PM

Last updated: 1/16/2026, 7:16:23 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats