CVE-2025-2284

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in the GetWebLoginCredentials function of Sante PACS Server.exe allows attackers to crash the service by sending specially crafted requests. This affects all systems running vulnerable versions of Sante PACS Server, potentially disrupting medical imaging workflows.

💻 Affected Systems

Products:
  • Sante PACS Server
Versions: Versions prior to the patched version (specific version numbers not provided in reference)
Operating Systems: Windows (based on .exe extension)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with the vulnerable function exposed are affected. The vulnerability is in the core authentication component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage preventing access to medical imaging data, potentially disrupting patient care workflows in healthcare environments.

🟠

Likely Case

Temporary service disruption requiring manual restart of the Sante PACS Server service, causing delays in medical imaging access.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and service restoration.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can easily target the service without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending crafted requests to the vulnerable function, but no public exploit code is available. The CWE-824 (Access of Uninitialized Pointer) suggests memory corruption issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.santesoft.com/security (example - actual URL not provided in reference)

Restart Required: No

Instructions:

1. Download the latest patched version from SanteSoft official website. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Verify service is running correctly.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Sante PACS Server to only trusted medical imaging workstations and administrative systems.

firewall rules to limit source IPs

Load Balancer/Proxy Protection

all

Implement rate limiting and request filtering at network perimeter to block suspicious authentication attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Sante PACS Server from untrusted networks
  • Deploy intrusion detection systems to monitor for DoS attempts and implement automated alerting

🔍 How to Verify

Check if Vulnerable:

Check Sante PACS Server version against vendor advisory. Monitor for unexpected service crashes or authentication failures.

Check Version:

Check Sante PACS Server about dialog or configuration files for version information

Verify Fix Applied:

After patching, test authentication functionality and monitor service stability. Check that version matches patched release.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from single source
  • Sante PACS Server service crash logs
  • Unexpected restarts of SantePACS service

Network Indicators:

  • Unusual volume of requests to authentication endpoints
  • Requests with malformed authentication data

SIEM Query:

source="SantePACS" AND (event_type="crash" OR event_type="authentication_failure") | stats count by src_ip

🔗 References

📤 Share & Export