CVE-2025-14501
📋 TL;DR
This vulnerability allows remote attackers to crash Sante PACS Server by sending specially crafted HTTP requests with malformed Content-Length headers. The server fails to validate a pointer before accessing it, causing a NULL pointer dereference that leads to denial of service. Any unpatched Sante PACS Server installation is vulnerable, and no authentication is required for exploitation.
💻 Affected Systems
- Sante PACS Server
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage of the PACS server, disrupting medical imaging workflows and potentially affecting patient care continuity.
Likely Case
Service crashes requiring manual restart, causing temporary unavailability of medical imaging data access.
If Mitigated
Service remains available with proper network segmentation and request filtering in place.
🎯 Exploit Status
Exploitation requires sending malformed HTTP requests but no authentication. Weaponization is likely due to low complexity and healthcare system targeting.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://www.santesoft.com/security-advisories/
Restart Required: Yes
Instructions:
1. Contact SanteSoft support for patch availability
2. Apply the security patch provided by vendor
3. Restart the Sante PACS Server service
4. Verify the patch is applied successfully
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allBlock or sanitize HTTP requests with malformed Content-Length headers
Network Segmentation
allRestrict access to Sante PACS Server to trusted networks only
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure to trusted sources only
- Deploy a WAF with rules to detect and block malformed HTTP Content-Length headers
🔍 How to Verify
Check if Vulnerable:
Check if running an unpatched version of Sante PACS Server. Contact vendor for specific version testing.
Check Version:
Check Sante PACS Server administration interface or contact vendor support
Verify Fix Applied:
Verify patch installation through vendor-provided verification method and test with controlled malformed HTTP requests.
📡 Detection & Monitoring
Log Indicators:
- Unexpected service crashes/restarts
- HTTP requests with malformed Content-Length headers in web logs
- Error logs containing NULL pointer or segmentation fault messages
Network Indicators:
- HTTP requests with unusual Content-Length values
- Multiple rapid connection attempts to PACS server port
SIEM Query:
source="web_logs" AND (Content-Length:"-" OR Content-Length:"" OR Content-Length:NULL)