CVE-2025-11672

5.3 MEDIUM

📋 TL;DR

Uniweb/SoliPACS WebServer developed by EBM Technologies has a missing authentication vulnerability that allows unauthenticated remote attackers to access a specific page and obtain user group names. This affects organizations using vulnerable versions of Uniweb/SoliPACS WebServer for medical imaging management.

💻 Affected Systems

Products:
  • Uniweb/SoliPACS WebServer
Versions: Specific versions not detailed in references, but all versions before the patch are affected
Operating Systems: Windows (presumed based on typical medical imaging software deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Uniweb/SoliPACS WebServer. Medical facilities using this software for PACS (Picture Archiving and Communication System) are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map organizational structure, identify privileged accounts, and use this information for targeted attacks or credential stuffing campaigns.

🟠

Likely Case

Information disclosure of user group names, potentially enabling social engineering or reconnaissance for further attacks.

🟢

If Mitigated

Limited to information disclosure without authentication bypass for sensitive data or system control.

🌐 Internet-Facing: HIGH - Unauthenticated remote access to sensitive information makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this for reconnaissance and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access to a specific page, making exploitation straightforward once the target URL is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references, but EBM Technologies has released updates

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10420-d1a4f-2.html

Restart Required: No

Instructions:

1. Contact EBM Technologies for the latest security update. 2. Apply the patch to all affected Uniweb/SoliPACS WebServer instances. 3. Verify authentication is properly enforced on all endpoints.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to Uniweb/SoliPACS WebServer to trusted networks only

Web Application Firewall Rules

all

Block unauthenticated access to the vulnerable endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Uniweb/SoliPACS WebServer from untrusted networks
  • Deploy a reverse proxy with authentication requirements for all access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access the specific vulnerable page without authentication. If user group names are returned, the system is vulnerable.

Check Version:

Check the Uniweb/SoliPACS WebServer administration interface or contact EBM Technologies for version verification

Verify Fix Applied:

After patching, attempt the same unauthenticated access. The page should require authentication or return an error.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to the vulnerable endpoint
  • Multiple failed authentication attempts followed by access to user group page

Network Indicators:

  • Unusual traffic patterns to the Uniweb/SoliPACS WebServer from untrusted sources
  • HTTP requests to the vulnerable endpoint without authentication headers

SIEM Query:

source="unauthenticated_access_logs" AND (uri CONTAINS "vulnerable_endpoint" OR response_code=200) AND user="anonymous"

🔗 References

📤 Share & Export