CVE-2025-14501

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to crash Sante PACS Server by sending specially crafted HTTP requests with malformed Content-Length headers. The server fails to validate a pointer before accessing it, causing a NULL pointer dereference that leads to denial of service. Any unpatched Sante PACS Server installation is vulnerable, and no authentication is required for exploitation.

💻 Affected Systems

Products:
  • Sante PACS Server
Versions: Specific versions not disclosed in available references
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable as this is a code-level flaw in HTTP request handling.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of the PACS server, disrupting medical imaging workflows and potentially affecting patient care continuity.

🟠

Likely Case

Service crashes requiring manual restart, causing temporary unavailability of medical imaging data access.

🟢

If Mitigated

Service remains available with proper network segmentation and request filtering in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed HTTP requests but no authentication. Weaponization is likely due to low complexity and healthcare system targeting.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.santesoft.com/security-advisories/

Restart Required: Yes

Instructions:

1. Contact SanteSoft support for patch availability
2. Apply the security patch provided by vendor
3. Restart the Sante PACS Server service
4. Verify the patch is applied successfully

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Block or sanitize HTTP requests with malformed Content-Length headers

Network Segmentation

all

Restrict access to Sante PACS Server to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only
  • Deploy a WAF with rules to detect and block malformed HTTP Content-Length headers

🔍 How to Verify

Check if Vulnerable:

Check if running an unpatched version of Sante PACS Server. Contact vendor for specific version testing.

Check Version:

Check Sante PACS Server administration interface or contact vendor support

Verify Fix Applied:

Verify patch installation through vendor-provided verification method and test with controlled malformed HTTP requests.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes/restarts
  • HTTP requests with malformed Content-Length headers in web logs
  • Error logs containing NULL pointer or segmentation fault messages

Network Indicators:

  • HTTP requests with unusual Content-Length values
  • Multiple rapid connection attempts to PACS server port

SIEM Query:

source="web_logs" AND (Content-Length:"-" OR Content-Length:"" OR Content-Length:NULL)

🔗 References

📤 Share & Export