CVE-2025-14096

8.4 HIGH

📋 TL;DR

This vulnerability in Radiometer medical analyzers allows attackers with physical access to extract credential information due to insufficient credential protection in the operating system. Affected customers have been notified, and only authorized personnel should have physical access to these devices.

💻 Affected Systems

Products:
  • Multiple Radiometer medical analyzers (specific models not disclosed in CVE)
Versions: Not specified in CVE description
Operating Systems: Not specified, but vulnerability is in OS credential protection
Default Config Vulnerable: ⚠️ Yes
Notes: All affected configurations appear vulnerable by default; requires physical access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, potentially compromising patient data, altering test results, or disrupting medical operations.

🟠

Likely Case

Credential theft leading to unauthorized access to sensitive medical data and system configuration.

🟢

If Mitigated

Limited impact if strict physical access controls prevent unauthorized personnel from reaching devices.

🌐 Internet-Facing: LOW - Requires physical access, not network exploitation.
🏢 Internal Only: HIGH - Physical access to medical devices in healthcare facilities poses significant risk if access controls are weak.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exists but not publicly available; exploitation requires physical device access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.radiometer.com/myradiometer

Restart Required: No

Instructions:

Contact local Radiometer representatives for permanent solution; no patch instructions available yet.

🔧 Temporary Workarounds

Physical Access Restriction

all

Limit physical access to authorized personnel only

🧯 If You Can't Patch

  • Implement strict physical security controls: locked rooms, access logs, surveillance
  • Segment network to isolate analyzers and monitor for unusual credential usage

🔍 How to Verify

Check if Vulnerable:

Check with Radiometer representative if your analyzer models are affected

Check Version:

Not specified - contact vendor for device-specific checks

Verify Fix Applied:

Verify with Radiometer after implementing their permanent solution

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized physical access logs
  • Unusual credential usage patterns

Network Indicators:

  • Unexpected authentication attempts from analyzer devices

SIEM Query:

Not applicable - physical access vulnerability

🔗 References

📤 Share & Export