CVE-2025-14095

6.8 MEDIUM

📋 TL;DR

A privilege boundary violation vulnerability in Radiometer medical analyzers allows users with physical access to bypass access controls and gain unauthorized functionality. This affects multiple Radiometer products and requires physical access to exploit. Affected customers have been notified by Radiometer.

💻 Affected Systems

Products:
  • Multiple Radiometer Products (specific products not detailed in advisory)
Versions: Not specified in provided information
Operating Systems: Windows 7, Windows XP, Windows 8, Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: CVSS score varies by underlying OS: 6.8 for Windows 7/XP, 5.7 for Windows 8/10. Physical access to analyzer required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized user gains administrative access to medical analyzer, potentially altering device functionality, accessing sensitive patient data, or compromising device integrity.

🟠

Likely Case

Unauthorized user bypasses intended restrictions to access features or data they shouldn't have access to, potentially affecting device operation.

🟢

If Mitigated

With proper physical access controls, only authorized personnel can interact with devices, limiting exploitation risk.

🌐 Internet-Facing: LOW - Physical access required, not remotely exploitable.
🏢 Internal Only: MEDIUM - Physical access requirement reduces risk, but insider threats or unauthorized physical access could lead to exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Researchers have working proof-of-concept but no public exploit available. Physical access bypasses authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.radiometer.com/myradiometer

Restart Required: No

Instructions:

Contact local Radiometer representative for permanent solution. No patch details provided in advisory.

🔧 Temporary Workarounds

Physical Access Control

all

Restrict physical access to analyzers to authorized personnel only

🧯 If You Can't Patch

  • Implement strict physical security controls around medical analyzers
  • Monitor and log physical access to analyzer locations

🔍 How to Verify

Check if Vulnerable:

Check with Radiometer representative or vendor advisory for specific product vulnerability status

Check Version:

Not specified - contact vendor for version information

Verify Fix Applied:

Verify with Radiometer representative that permanent solution has been implemented

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized physical access attempts
  • Unusual user activity on analyzer interfaces

Network Indicators:

  • Not applicable - physical access required

SIEM Query:

Not applicable - physical access vulnerability

🔗 References

📤 Share & Export