Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64642: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose

0
High
VulnerabilityCVE-2025-64642cvecve-2025-64642cwe-732
Published: Tue Dec 02 2025 (12/02/2025, 21:03:43 UTC)
Source: CVE Database V5
Vendor/Project: Mirion Medical
Product: EC2 Software NMIS BioDose

Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

AI-Powered Analysis

AILast updated: 12/02/2025, 21:16:59 UTC

Technical Analysis

CVE-2025-64642 identifies a vulnerability in Mirion Medical's EC2 Software NMIS BioDose, versions 22.02 and earlier, where the installation directory paths have insecure default file permissions. Specifically, the permissions allow users on client workstations—who may not have administrative privileges—to modify program executables and libraries. This vulnerability is categorized under CWE-732, which involves incorrect permission assignments for critical resources. The insecure permissions create an attack vector for local users to perform unauthorized modifications, potentially leading to code tampering, privilege escalation, or execution of malicious payloads within the software environment. The vulnerability does not require authentication or user interaction, but exploitation is limited to local access (AV:L). The CVSS 4.0 vector indicates low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and significant impact on confidentiality (VC:L), integrity (VI:H), and availability (VA:H). Although no public exploits are currently known, the risk is elevated due to the critical role of NMIS BioDose in medical dose monitoring and management. The vulnerability's presence in installation directories suggests that default deployment practices may not enforce secure permissions, making it essential for organizations to audit and harden these settings. The lack of available patches at the time of publication further emphasizes the need for immediate compensating controls. Given the software's use in healthcare environments, exploitation could disrupt medical operations or compromise patient safety by altering dose measurement data or software behavior.

Potential Impact

For European organizations, especially those in the healthcare sector using Mirion Medical's NMIS BioDose software, this vulnerability poses a significant risk. Unauthorized modification of executables and libraries can lead to system compromise, data integrity loss, and potential disruption of critical medical dose monitoring functions. This could result in incorrect radiation dose administration, endangering patient safety and violating regulatory compliance such as GDPR and medical device regulations. The local access requirement limits remote exploitation but does not mitigate risk in shared workstation environments or where insider threats exist. The integrity and availability impacts are high, potentially causing operational downtime or erroneous medical data. Additionally, compromised systems may serve as footholds for further lateral movement within hospital networks. The absence of known exploits reduces immediate threat but does not eliminate the risk of future targeted attacks. European healthcare providers must consider the criticality of this software in their operational technology and clinical workflows, prioritizing remediation to maintain patient safety and data trustworthiness.

Mitigation Recommendations

1. Immediately audit file and directory permissions on all NMIS BioDose installations to ensure that only authorized administrators have write access to program executables and libraries. 2. Implement strict access control policies on client workstations, limiting local user permissions and preventing unauthorized modifications. 3. Employ application whitelisting or code integrity verification tools to detect and block unauthorized changes to software binaries. 4. Isolate workstations running NMIS BioDose from general user environments to reduce the risk of local privilege abuse. 5. Monitor file system changes and maintain logs for critical directories to detect suspicious activity promptly. 6. Engage with Mirion Medical for official patches or updates addressing this vulnerability and apply them as soon as they become available. 7. Conduct user training to raise awareness about the risks of local privilege misuse and enforce least privilege principles. 8. Where possible, deploy endpoint detection and response (EDR) solutions to identify anomalous behavior related to executable modifications. 9. Review and enhance physical security controls to prevent unauthorized physical access to client workstations. 10. Coordinate with regulatory compliance teams to document mitigation efforts and maintain audit readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:56:52.827Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f572b3b1ed793e36e758a

Added to database: 12/2/2025, 9:16:27 PM

Last enriched: 12/2/2025, 9:16:59 PM

Last updated: 12/2/2025, 10:43:18 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats