CVE-2025-61959: CWE-209 Generation of Error Message Containing Sensitive Information in Vertikal Systems Hospital Manager Backend Services
Prior to September 19, 2025, the Hospital Manager Backend Services returned verbose ASP.NET error pages for invalid WebResource.axd requests, disclosing framework and ASP.NET version information, stack traces, internal paths, and the insecure configuration 'customErrors mode="Off"', which could have facilitated reconnaissance by unauthenticated attackers.
AI Analysis
Technical Summary
CVE-2025-61959 is a vulnerability classified under CWE-209, which involves the generation of error messages containing sensitive information. Specifically, the Hospital Manager Backend Services by Vertikal Systems, prior to September 19, 2025, returned verbose ASP.NET error pages when handling invalid WebResource.axd requests. These error pages disclosed critical information including the ASP.NET framework version, stack traces, internal file paths, and revealed that the 'customErrors' setting was configured as 'Off'. This misconfiguration allows unauthenticated attackers to gain insights into the backend system's architecture and software versions, facilitating reconnaissance activities that could lead to more sophisticated attacks such as targeted exploitation or privilege escalation. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 6.9 reflects a medium severity rating, emphasizing the confidentiality impact due to information disclosure but no direct impact on integrity or availability. No known exploits have been reported in the wild, and no patches or mitigation links were provided at the time of publication. The vulnerability highlights the importance of secure error handling configurations in web applications, especially in critical healthcare environments where sensitive patient data and operational continuity are paramount.
Potential Impact
For European organizations, particularly those in the healthcare sector using Vertikal Systems' Hospital Manager Backend Services, this vulnerability poses a significant risk of information leakage. The disclosure of framework versions and internal paths can aid attackers in identifying exploitable software components or misconfigurations, increasing the likelihood of subsequent targeted attacks such as injection flaws, privilege escalation, or ransomware. Given the critical nature of healthcare infrastructure and the sensitivity of patient data, even indirect reconnaissance can lead to severe consequences including data breaches, operational disruptions, and regulatory non-compliance under GDPR. The medium severity rating reflects that while the vulnerability does not directly compromise data integrity or availability, the information exposed can be leveraged to mount more damaging attacks. European healthcare providers must consider this vulnerability as part of their broader risk management and incident response planning to prevent escalation.
Mitigation Recommendations
To mitigate CVE-2025-61959, organizations should immediately review and update the error handling configuration of the Hospital Manager Backend Services. Specifically, the 'customErrors' setting in the ASP.NET configuration must be set to 'On' or 'RemoteOnly' to prevent detailed error information from being exposed to unauthenticated users. Additionally, implement centralized logging of errors that captures detailed information internally without exposing it to end users. Conduct thorough security testing to ensure no verbose error messages are returned for invalid requests, particularly for WebResource.axd or similar endpoints. Network-level protections such as Web Application Firewalls (WAFs) can be configured to block suspicious requests that trigger error pages. Regularly update and patch the Hospital Manager Backend Services as vendor updates become available. Finally, perform security awareness training for developers and administrators on secure error handling practices and the risks of information disclosure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-61959: CWE-209 Generation of Error Message Containing Sensitive Information in Vertikal Systems Hospital Manager Backend Services
Description
Prior to September 19, 2025, the Hospital Manager Backend Services returned verbose ASP.NET error pages for invalid WebResource.axd requests, disclosing framework and ASP.NET version information, stack traces, internal paths, and the insecure configuration 'customErrors mode="Off"', which could have facilitated reconnaissance by unauthenticated attackers.
AI-Powered Analysis
Technical Analysis
CVE-2025-61959 is a vulnerability classified under CWE-209, which involves the generation of error messages containing sensitive information. Specifically, the Hospital Manager Backend Services by Vertikal Systems, prior to September 19, 2025, returned verbose ASP.NET error pages when handling invalid WebResource.axd requests. These error pages disclosed critical information including the ASP.NET framework version, stack traces, internal file paths, and revealed that the 'customErrors' setting was configured as 'Off'. This misconfiguration allows unauthenticated attackers to gain insights into the backend system's architecture and software versions, facilitating reconnaissance activities that could lead to more sophisticated attacks such as targeted exploitation or privilege escalation. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 6.9 reflects a medium severity rating, emphasizing the confidentiality impact due to information disclosure but no direct impact on integrity or availability. No known exploits have been reported in the wild, and no patches or mitigation links were provided at the time of publication. The vulnerability highlights the importance of secure error handling configurations in web applications, especially in critical healthcare environments where sensitive patient data and operational continuity are paramount.
Potential Impact
For European organizations, particularly those in the healthcare sector using Vertikal Systems' Hospital Manager Backend Services, this vulnerability poses a significant risk of information leakage. The disclosure of framework versions and internal paths can aid attackers in identifying exploitable software components or misconfigurations, increasing the likelihood of subsequent targeted attacks such as injection flaws, privilege escalation, or ransomware. Given the critical nature of healthcare infrastructure and the sensitivity of patient data, even indirect reconnaissance can lead to severe consequences including data breaches, operational disruptions, and regulatory non-compliance under GDPR. The medium severity rating reflects that while the vulnerability does not directly compromise data integrity or availability, the information exposed can be leveraged to mount more damaging attacks. European healthcare providers must consider this vulnerability as part of their broader risk management and incident response planning to prevent escalation.
Mitigation Recommendations
To mitigate CVE-2025-61959, organizations should immediately review and update the error handling configuration of the Hospital Manager Backend Services. Specifically, the 'customErrors' setting in the ASP.NET configuration must be set to 'On' or 'RemoteOnly' to prevent detailed error information from being exposed to unauthenticated users. Additionally, implement centralized logging of errors that captures detailed information internally without exposing it to end users. Conduct thorough security testing to ensure no verbose error messages are returned for invalid requests, particularly for WebResource.axd or similar endpoints. Network-level protections such as Web Application Firewalls (WAFs) can be configured to block suspicious requests that trigger error pages. Regularly update and patch the Hospital Manager Backend Services as vendor updates become available. Finally, perform security awareness training for developers and administrators on secure error handling practices and the risks of information disclosure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-10-08T22:13:45.428Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69028fd8779efea1caa7305b
Added to database: 10/29/2025, 10:06:16 PM
Last enriched: 10/29/2025, 10:09:40 PM
Last updated: 10/30/2025, 3:47:38 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61116: n/a
UnknownCVE-2025-61113: n/a
UnknownCVE-2025-46363: CWE-23: Relative Path Traversal in Dell Secure Connect Gateway SCG 5.0 Application and Appliance
MediumCVE-2025-61115: n/a
UnknownCVE-2025-36592: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dell Secure Connect Gateway SCG Policy Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.