CVE-2025-14097

7.2 HIGH

📋 TL;DR

A vulnerability in Radiometer medical device software allows remote code execution and unauthorized device management when specific internal conditions are met. Affected customers using vulnerable Radiometer products with remote support enabled are at risk. Exploitation requires remote access and additional information obtained through other means.

💻 Affected Systems

Products:
  • Multiple Radiometer medical analyzer products (specific models not detailed in CVE)
Versions: Not specified in CVE description
Operating Systems: Embedded/application-specific OS on Radiometer devices
Default Config Vulnerable: ✅ No
Notes: Requires both vulnerable application software version AND remote support feature enabled in the analyzer.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, manipulate medical device functions, access sensitive patient data, and potentially disrupt critical healthcare operations.

🟠

Likely Case

Unauthorized device management leading to configuration changes, data exfiltration, or disruption of medical analyzer functionality.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent remote connections to vulnerable devices.

🌐 Internet-Facing: HIGH if devices are directly internet-accessible with remote support enabled.
🏢 Internal Only: MEDIUM to HIGH depending on network segmentation and internal access controls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires remote connection establishment and additional information obtained through other means. Working proof-of-concept exists but no public exploits known at publication time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.radiometer.com/myradiometer

Restart Required: No

Instructions:

Contact local Radiometer representatives for permanent solution. Affected customers have been informed directly.

🔧 Temporary Workarounds

Network Isolation

all

Remove vulnerable analyzers from network if network is not considered secure

Disconnect network cable or disable network interface on affected Radiometer devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Radiometer devices from untrusted networks
  • Disable remote support feature on all affected analyzers if medically permissible

🔍 How to Verify

Check if Vulnerable:

Check Radiometer device configuration for remote support feature status and verify with Radiometer representative about affected software versions

Check Version:

Check device software version through Radiometer device interface or management console

Verify Fix Applied:

Confirm with Radiometer representative that permanent solution has been implemented and remote support is properly secured

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized remote connection attempts to Radiometer devices
  • Unexpected configuration changes on medical analyzers
  • Unusual network traffic to/from medical device network segments

Network Indicators:

  • Unexpected remote connections to Radiometer device ports
  • Traffic patterns indicating device management from unauthorized sources

SIEM Query:

source_ip IN (medical_device_subnets) AND (destination_port IN (radiometer_ports) OR protocol_anomaly_detected)

🔗 References

📤 Share & Export