CVE-2025-15581

N/A Unknown

📋 TL;DR

Orthanc versions before 1.12.10 have an authorization logic flaw in HTTP Basic Authentication that allows privilege escalation. Attackers can exploit this to gain administrative access to the DICOM server. All Orthanc deployments using HTTP Basic Authentication with versions below 1.12.10 are affected.

💻 Affected Systems

Products:
  • Orthanc
Versions: All versions before 1.12.10
Operating Systems: All platforms running Orthanc
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using HTTP Basic Authentication. Other authentication methods may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative access to Orthanc DICOM server, allowing complete control over medical imaging data, configuration changes, and potential access to connected systems.

🟠

Likely Case

Unauthorized users gaining elevated privileges to access, modify, or delete medical imaging studies and patient data.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls are in place, but still represents a significant authorization bypass.

🌐 Internet-Facing: HIGH - Internet-facing Orthanc instances are directly exploitable without authentication bypass.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can escalate privileges to administrative access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but allows privilege escalation from any authenticated user to administrator.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12.10

Vendor Advisory: https://discourse.orthanc-server.org/t/orthanc-1-12-10/6326

Restart Required: Yes

Instructions:

1. Backup current Orthanc configuration and data. 2. Download Orthanc 1.12.10 from official repository. 3. Stop Orthanc service. 4. Install/upgrade to version 1.12.10. 5. Restart Orthanc service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Disable HTTP Basic Authentication

all

Temporarily disable HTTP Basic Authentication and use alternative authentication methods

Edit Orthanc configuration file and set "AuthenticationEnabled" to false or remove BasicAuth configuration

Network Access Control

linux

Restrict network access to Orthanc to trusted IPs only

iptables -A INPUT -p tcp --dport 8042 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8042 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Orthanc from untrusted networks
  • Enable comprehensive logging and monitoring for authentication and authorization events

🔍 How to Verify

Check if Vulnerable:

Check Orthanc version via web interface at /system or run: orthanc --version

Check Version:

orthanc --version

Verify Fix Applied:

Verify version is 1.12.10 or higher and test authentication with non-admin users cannot access admin endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to admin endpoints
  • Multiple failed authentication attempts followed by successful admin access from non-admin user

Network Indicators:

  • HTTP requests to /system, /tools, or other admin endpoints from non-admin users
  • Unusual authentication patterns

SIEM Query:

source="orthanc" AND (uri_path="/system" OR uri_path="/tools") AND user!="admin" AND response_code=200

🔗 References

📤 Share & Export