CVE-2025-15240
📋 TL;DR
CVE-2025-15240 is an arbitrary file upload vulnerability in QOCA aim AI Medical Cloud Platform that allows authenticated attackers to upload malicious files and execute arbitrary code on the server. This affects all organizations using vulnerable versions of the QOCA platform, potentially compromising patient data and healthcare operations.
💻 Affected Systems
- QOCA aim AI Medical Cloud Platform
📦 What is this software?
Qoca Aim by Quantatw
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data exfiltration of sensitive medical records, ransomware deployment across healthcare infrastructure, and disruption of critical medical services.
Likely Case
Attackers establish persistent access via web shells, steal patient data, and potentially pivot to other healthcare systems in the network.
If Mitigated
With proper file upload validation and authentication controls, the attack surface is reduced, though authenticated users could still attempt exploitation.
🎯 Exploit Status
Arbitrary file upload vulnerabilities are commonly exploited with simple tools. Authentication requirement adds one barrier, but once authenticated, exploitation is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in references - contact Quanta Computer for patched version
Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10616-cd942-2.html
Restart Required: Yes
Instructions:
1. Contact Quanta Computer for security patch
2. Apply patch to all QOCA aim instances
3. Restart affected services
4. Verify fix implementation
🔧 Temporary Workarounds
File Upload Restriction
allImplement strict file upload validation including file type checking, size limits, and content inspection
Web Application Firewall Rules
allDeploy WAF rules to block suspicious file upload patterns and web shell indicators
🧯 If You Can't Patch
- Implement strict network segmentation to isolate QOCA platform from sensitive systems
- Deploy file integrity monitoring and endpoint detection on affected servers
🔍 How to Verify
Check if Vulnerable:
Test file upload functionality with various file types and extensions. Check if server executes uploaded files with web shell extensions (.php, .jsp, .aspx, etc.)
Check Version:
Check QOCA platform version through admin interface or contact Quanta Computer support
Verify Fix Applied:
Attempt to upload malicious file types and verify they are rejected. Check that uploaded files cannot be executed as code.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to medical platform endpoints
- Multiple failed upload attempts with suspicious extensions
- Successful uploads of executable files
Network Indicators:
- HTTP POST requests with file uploads to unusual endpoints
- Traffic patterns indicating web shell communication
SIEM Query:
source="qoca_logs" AND (event="file_upload" AND (file_extension="php" OR file_extension="jsp" OR file_extension="aspx"))