CVE-2025-0574

7.5 HIGH

📋 TL;DR

CVE-2025-0574 is a memory corruption vulnerability in Sante PACS Server's URL parsing that allows unauthenticated remote attackers to cause denial-of-service conditions. The flaw exists due to improper validation of user-supplied URL data in the web server module. All internet-facing Sante PACS Server installations are affected.

💻 Affected Systems

Products:
  • Sante PACS Server
Versions: Specific versions not detailed in advisory; check vendor documentation
Operating Systems: Windows-based deployments (typical for medical imaging software)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with web interface enabled are vulnerable. Authentication is not required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring manual restart, potentially disrupting medical imaging workflows and patient care.

🟠

Likely Case

Service disruption causing temporary unavailability of the PACS server, affecting medical image access.

🟢

If Mitigated

Minimal impact if server is behind proper network segmentation and intrusion prevention systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-25318 indicates Zero Day Initiative discovery; no public exploit code available yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Sante PACS Server vendor advisory for specific patched version

Vendor Advisory: https://www.santesoft.com/security-advisories/ (example - check actual vendor site)

Restart Required: Yes

Instructions:

1. Contact Sante support for patch availability
2. Backup server configuration and data
3. Apply vendor-provided patch
4. Restart Sante PACS Server services
5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Sante PACS Server web interface to trusted networks only

Web Application Firewall

all

Deploy WAF with URL path validation rules to block malicious requests

🧯 If You Can't Patch

  • Isolate Sante PACS Server behind firewall with strict IP whitelisting
  • Implement network monitoring for abnormal URL patterns and DoS attempts

🔍 How to Verify

Check if Vulnerable:

Check Sante PACS Server version against vendor's vulnerable version list

Check Version:

Check Sante PACS Server administration interface or installation directory for version information

Verify Fix Applied:

Verify patch installation and test URL parsing functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts
  • Unusual URL patterns in web server logs
  • Service crash/restart events

Network Indicators:

  • Abnormal HTTP requests with malformed URL paths
  • Traffic spikes to PACS server web port

SIEM Query:

source="sante-pacs-logs" AND (event_type="service_crash" OR url_path="*malformed*" OR status_code=500)

🔗 References

📤 Share & Export