Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64642: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose

0
High
VulnerabilityCVE-2025-64642cvecve-2025-64642cwe-732
Published: Tue Dec 02 2025 (12/02/2025, 21:03:43 UTC)
Source: CVE Database V5
Vendor/Project: Mirion Medical
Product: EC2 Software NMIS BioDose

Description

CVE-2025-64642 is a high-severity vulnerability in Mirion Medical's EC2 Software NMIS BioDose (version 22. 02 and earlier) where installation directories have insecure file permissions. This misconfiguration allows local users on client workstations to modify critical program executables and libraries without requiring authentication or user interaction. Exploiting this vulnerability could lead to privilege escalation, code tampering, or disruption of medical dose measurement operations. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to the integrity and availability of the affected software. European healthcare organizations using this software are particularly at risk due to the critical nature of medical radiation dose monitoring. Mitigation requires immediate review and correction of file permissions on installation directories, restricting write access to trusted administrators only. Countries with advanced healthcare infrastructure and known deployments of Mirion Medical products, such as Germany, France, the UK, and the Netherlands, are most likely to be impacted. Given the ease of local exploitation and high impact on system integrity and availability, this vulnerability is rated as high severity. Defenders should prioritize patching or applying configuration hardening to prevent unauthorized modifications.

AI-Powered Analysis

AILast updated: 12/09/2025, 21:22:37 UTC

Technical Analysis

CVE-2025-64642 identifies a vulnerability in Mirion Medical's EC2 Software NMIS BioDose, specifically versions 22.02 and earlier, where the installation directory paths are configured with insecure file permissions by default. This CWE-732 (Incorrect Permission Assignment for Critical Resource) flaw allows local users on client workstations to modify program executables and libraries. Because these files are critical to the software's operation, unauthorized modification can lead to code tampering, potentially enabling privilege escalation or the execution of malicious code within the context of the affected application. The vulnerability does not require authentication or user interaction, but it does require local access to the client workstation. The CVSS 4.0 base score is 7.1, reflecting a high severity due to the combination of low attack complexity, no privileges required, and significant impact on integrity and availability. The vulnerability is particularly concerning in medical environments where NMIS BioDose is used to monitor and manage radiation doses, as any tampering could compromise patient safety or disrupt clinical workflows. No patches or exploits are currently known, but the default insecure permissions represent a critical misconfiguration that must be addressed. The vulnerability was reserved in November 2025 and published in December 2025 by ICS-CERT, indicating its relevance to industrial control and medical device security.

Potential Impact

The primary impact of CVE-2025-64642 is on the integrity and availability of the NMIS BioDose software, which is critical for radiation dose monitoring in medical settings. Unauthorized modification of executables and libraries can lead to malicious code execution, data corruption, or denial of service, potentially compromising patient safety and clinical decision-making. For European organizations, especially hospitals and medical research centers relying on Mirion Medical's solutions, this vulnerability could disrupt essential healthcare services and lead to regulatory non-compliance under EU medical device and data protection regulations. Additionally, compromised systems could serve as footholds for broader network attacks, threatening confidentiality of sensitive patient data. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or compromised workstations could be leveraged. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score and critical nature of the software demand urgent attention.

Mitigation Recommendations

To mitigate CVE-2025-64642, organizations should immediately audit the file and directory permissions of the NMIS BioDose installation paths on all client workstations and servers. Permissions must be restricted to trusted administrators only, removing write access from standard users or any non-administrative accounts. Implementing strict access control lists (ACLs) and leveraging operating system security features such as Windows Group Policy or Linux file permission models can enforce these restrictions. Additionally, organizations should monitor file integrity using tools like tripwire or OS-integrated file integrity monitoring to detect unauthorized changes promptly. Since no patches are currently available, configuration hardening is critical. Limiting local access to authorized personnel and employing endpoint security solutions to detect suspicious activity can further reduce risk. Regular backups of the software and configuration files should be maintained to enable recovery in case of tampering. Finally, organizations should engage with Mirion Medical for updates and patches and consider applying any vendor-recommended security configurations as they become available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:56:52.827Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f572b3b1ed793e36e758a

Added to database: 12/2/2025, 9:16:27 PM

Last enriched: 12/9/2025, 9:22:37 PM

Last updated: 1/17/2026, 12:54:35 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats