Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62575: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose

0
High
VulnerabilityCVE-2025-62575cvecve-2025-62575cwe-732
Published: Tue Dec 02 2025 (12/02/2025, 21:11:20 UTC)
Source: CVE Database V5
Vendor/Project: Mirion Medical
Product: EC2 Software NMIS BioDose

Description

CVE-2025-62575 is a high-severity vulnerability in Mirion Medical's EC2 Software NMIS BioDose, affecting versions up to V22. 02. The issue arises because the SQL Server user account 'nmdbuser' and other created accounts are assigned the sysadmin role by default, granting excessive privileges. This misconfiguration allows remote attackers to execute arbitrary code via certain built-in stored procedures without requiring user interaction or high authentication levels. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating a significant risk to confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical access level make it a pressing concern. European healthcare and medical research organizations using this software are particularly at risk due to the sensitive nature of the data and regulatory requirements. Mitigation requires immediate privilege reduction for SQL accounts, strict access controls, and monitoring of database activities.

AI-Powered Analysis

AILast updated: 12/09/2025, 21:23:17 UTC

Technical Analysis

CVE-2025-62575 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Mirion Medical's EC2 Software NMIS BioDose, specifically versions up to V22.02. The software relies on a Microsoft SQL Server backend where the SQL user account 'nmdbuser' and other accounts created by default are assigned the sysadmin role. This role grants unrestricted administrative privileges over the SQL Server instance, which is excessive for typical application operations. Due to this misconfiguration, an attacker with network access to the SQL Server can leverage built-in stored procedures to execute arbitrary code remotely, leading to potential full system compromise. The vulnerability does not require user interaction and has a low attack complexity, with only limited privileges needed (SQL user with sysadmin role). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:L). Although no public exploits are currently known, the vulnerability poses a significant risk due to the critical permissions granted by default. The root cause is improper permission assignment during installation or configuration, violating the principle of least privilege. This vulnerability could allow attackers to execute arbitrary commands on the host system, access or modify sensitive medical data, disrupt operations, or pivot to other network assets. Given the critical nature of medical data and regulatory frameworks such as GDPR, exploitation could have severe legal and operational consequences.

Potential Impact

For European organizations, particularly those in healthcare, medical research, and radiation safety sectors using Mirion Medical's EC2 Software NMIS BioDose, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive patient and research data, violating GDPR and other data protection regulations. The ability to execute arbitrary code remotely could result in ransomware deployment, data destruction, or prolonged system outages, severely impacting patient care and operational continuity. Additionally, compromised systems could be used as footholds for lateral movement within hospital or research networks, increasing the attack surface. The reputational damage and potential regulatory fines from data breaches would be significant. Given the critical role of NMIS BioDose in radiation dose monitoring and safety compliance, disruption could also lead to non-compliance with safety standards, endangering personnel and patients. The high CVSS score reflects the severity and ease of exploitation, emphasizing the urgency for European organizations to address this vulnerability promptly.

Mitigation Recommendations

1. Immediately audit and reduce the privileges of the 'nmdbuser' and any other SQL accounts created by the EC2 Software NMIS BioDose installation, removing the sysadmin role and assigning only the minimum necessary permissions. 2. Implement network segmentation and firewall rules to restrict access to the SQL Server instance only to authorized application servers and administrators. 3. Enable detailed logging and monitoring of SQL Server activities, focusing on the use of stored procedures and privilege escalations. 4. Apply principle of least privilege in all database and application configurations, reviewing default settings during installation or upgrades. 5. If available, apply vendor patches or updates addressing this vulnerability as soon as they are released; if no patches exist, consider compensating controls such as isolating the database server. 6. Conduct regular vulnerability assessments and penetration testing focused on database security and privilege management. 7. Train IT and security staff on secure configuration practices for Microsoft SQL Server and the specific application to prevent recurrence. 8. Develop and test incident response plans for potential exploitation scenarios involving database compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:56:52.854Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f572b3b1ed793e36e7584

Added to database: 12/2/2025, 9:16:27 PM

Last enriched: 12/9/2025, 9:23:17 PM

Last updated: 1/17/2026, 2:49:13 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats