CVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
CVE-2025-64778 is a high-severity vulnerability in Mirion Medical's EC2 Software NMIS BioDose (version 22. 02 and earlier) caused by hard-coded plaintext passwords embedded in executable binaries. These credentials can be exploited by attackers with low privileges and no user interaction to gain unauthorized access to the application and its database, potentially compromising confidentiality and integrity. The vulnerability does not require network-level access but local access, limiting remote exploitation. No known exploits are currently reported in the wild. European organizations using this software in medical or radiation monitoring contexts face risks of data breaches and operational disruption. Mitigation requires removing hard-coded credentials, implementing secure credential storage, and applying vendor patches once available. Countries with significant healthcare infrastructure and usage of Mirion Medical products, such as Germany, France, and the UK, are most likely affected. Given the high CVSS score (8. 4) and potential impact on sensitive medical data, immediate remediation is advised.
AI Analysis
Technical Summary
CVE-2025-64778 identifies a critical security flaw in Mirion Medical's EC2 Software NMIS BioDose, versions 22.02 and earlier, where executable binaries contain hard-coded plaintext passwords. This vulnerability falls under CWE-798, which pertains to the use of hard-coded credentials that attackers can extract and use to bypass authentication controls. The embedded passwords provide unauthorized access to both the application layer and the underlying database, potentially allowing attackers to read, modify, or delete sensitive data related to radiation dose monitoring. The CVSS 4.0 vector indicates the attack requires local access (AV:L), low attack complexity (AC:L), no user interaction (UI:N), and low privileges (PR:L), but results in high confidentiality and integrity impact, with limited availability impact. The vulnerability does not require network access or user interaction, but an attacker must have some level of local access, such as through compromised user accounts or insider threats. No public exploits have been reported yet, but the presence of hard-coded credentials is a well-known risk factor that can be leveraged in targeted attacks or insider misuse. The lack of patches at the time of publication necessitates immediate interim mitigations. This vulnerability is particularly concerning for medical and industrial control environments where NMIS BioDose is deployed, as unauthorized access could lead to data manipulation or loss of trust in radiation monitoring results.
Potential Impact
For European organizations, especially those in healthcare, nuclear medicine, and radiation safety sectors, this vulnerability poses a significant risk. Unauthorized access to the NMIS BioDose application and database could lead to exposure or alteration of sensitive patient radiation dose data, potentially violating GDPR and other data protection regulations. Integrity breaches could result in incorrect dose reporting, affecting patient safety and regulatory compliance. The local access requirement somewhat limits exploitation scope, but insider threats or compromised local accounts could still lead to serious breaches. Operational disruptions could occur if attackers modify or delete critical data, impacting clinical decision-making and safety monitoring. The reputational damage and potential regulatory penalties for mishandling sensitive medical data could be substantial. Given the critical nature of radiation dose monitoring, any compromise could have downstream effects on patient care quality and safety.
Mitigation Recommendations
Organizations should immediately audit their NMIS BioDose deployments to identify affected versions and binaries containing hard-coded credentials. Until patches are released, restrict local access to trusted personnel only and monitor for unusual access patterns or privilege escalations. Employ application-layer controls such as multi-factor authentication and network segmentation to limit exposure. Replace hard-coded credentials with secure credential management solutions, such as environment variables or encrypted vaults, once vendor patches or updates become available. Conduct thorough code reviews and binary analysis to detect embedded secrets in custom or legacy software components. Implement strict logging and alerting for access to the NMIS BioDose application and database. Engage with Mirion Medical for timelines on official patches and apply them promptly. Additionally, ensure compliance with data protection regulations by encrypting sensitive data at rest and in transit and maintaining incident response plans tailored to medical device software vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Switzerland, Austria
CVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
Description
CVE-2025-64778 is a high-severity vulnerability in Mirion Medical's EC2 Software NMIS BioDose (version 22. 02 and earlier) caused by hard-coded plaintext passwords embedded in executable binaries. These credentials can be exploited by attackers with low privileges and no user interaction to gain unauthorized access to the application and its database, potentially compromising confidentiality and integrity. The vulnerability does not require network-level access but local access, limiting remote exploitation. No known exploits are currently reported in the wild. European organizations using this software in medical or radiation monitoring contexts face risks of data breaches and operational disruption. Mitigation requires removing hard-coded credentials, implementing secure credential storage, and applying vendor patches once available. Countries with significant healthcare infrastructure and usage of Mirion Medical products, such as Germany, France, and the UK, are most likely affected. Given the high CVSS score (8. 4) and potential impact on sensitive medical data, immediate remediation is advised.
AI-Powered Analysis
Technical Analysis
CVE-2025-64778 identifies a critical security flaw in Mirion Medical's EC2 Software NMIS BioDose, versions 22.02 and earlier, where executable binaries contain hard-coded plaintext passwords. This vulnerability falls under CWE-798, which pertains to the use of hard-coded credentials that attackers can extract and use to bypass authentication controls. The embedded passwords provide unauthorized access to both the application layer and the underlying database, potentially allowing attackers to read, modify, or delete sensitive data related to radiation dose monitoring. The CVSS 4.0 vector indicates the attack requires local access (AV:L), low attack complexity (AC:L), no user interaction (UI:N), and low privileges (PR:L), but results in high confidentiality and integrity impact, with limited availability impact. The vulnerability does not require network access or user interaction, but an attacker must have some level of local access, such as through compromised user accounts or insider threats. No public exploits have been reported yet, but the presence of hard-coded credentials is a well-known risk factor that can be leveraged in targeted attacks or insider misuse. The lack of patches at the time of publication necessitates immediate interim mitigations. This vulnerability is particularly concerning for medical and industrial control environments where NMIS BioDose is deployed, as unauthorized access could lead to data manipulation or loss of trust in radiation monitoring results.
Potential Impact
For European organizations, especially those in healthcare, nuclear medicine, and radiation safety sectors, this vulnerability poses a significant risk. Unauthorized access to the NMIS BioDose application and database could lead to exposure or alteration of sensitive patient radiation dose data, potentially violating GDPR and other data protection regulations. Integrity breaches could result in incorrect dose reporting, affecting patient safety and regulatory compliance. The local access requirement somewhat limits exploitation scope, but insider threats or compromised local accounts could still lead to serious breaches. Operational disruptions could occur if attackers modify or delete critical data, impacting clinical decision-making and safety monitoring. The reputational damage and potential regulatory penalties for mishandling sensitive medical data could be substantial. Given the critical nature of radiation dose monitoring, any compromise could have downstream effects on patient care quality and safety.
Mitigation Recommendations
Organizations should immediately audit their NMIS BioDose deployments to identify affected versions and binaries containing hard-coded credentials. Until patches are released, restrict local access to trusted personnel only and monitor for unusual access patterns or privilege escalations. Employ application-layer controls such as multi-factor authentication and network segmentation to limit exposure. Replace hard-coded credentials with secure credential management solutions, such as environment variables or encrypted vaults, once vendor patches or updates become available. Conduct thorough code reviews and binary analysis to detect embedded secrets in custom or legacy software components. Implement strict logging and alerting for access to the NMIS BioDose application and database. Engage with Mirion Medical for timelines on official patches and apply them promptly. Additionally, ensure compliance with data protection regulations by encrypting sensitive data at rest and in transit and maintaining incident response plans tailored to medical device software vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-11-11T20:56:52.864Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692f572b3b1ed793e36e758d
Added to database: 12/2/2025, 9:16:27 PM
Last enriched: 12/9/2025, 9:22:51 PM
Last updated: 1/17/2026, 12:53:27 AM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-5489
LowCVE-2025-5102
LowCVE-2024-8506
LowCVE-2024-8491
LowCVE-2026-23745: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.