CVE-2025-26469

9.3 CRITICAL

📋 TL;DR

This vulnerability allows attackers to decrypt credentials stored in registry keys due to incorrect default permissions in MedDream PACS Premium. Attackers can execute malicious scripts to exploit this, potentially compromising sensitive medical imaging data. Healthcare organizations using MedDream PACS Premium 7.3.3.840 are affected.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.3.840
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects CServerSettings::SetRegistryValues functionality; requires Windows registry access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of medical imaging systems, unauthorized access to patient health information (PHI), potential ransomware deployment across hospital networks, and violation of HIPAA regulations.

🟠

Likely Case

Credential theft leading to unauthorized access to PACS systems, potential data exfiltration of medical images and patient records, and lateral movement within healthcare networks.

🟢

If Mitigated

Limited impact with proper network segmentation, credential rotation, and monitoring in place, though registry access could still expose some credentials.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to execute scripts/applications on the target system; local access or remote code execution needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor MedDream vendor website for security updates
2. Apply any available patches immediately
3. Test patches in non-production environment first

🔧 Temporary Workarounds

Restrict Registry Permissions

windows

Modify registry key permissions to prevent unauthorized access to configuration keys

regedit.exe (manual configuration required)
Set registry ACLs to restrict access to SYSTEM and authorized administrators only

Credential Rotation

all

Change all credentials stored in MedDream configuration

Change database passwords
Update service account credentials
Rotate encryption keys

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MedDream systems from general network traffic
  • Deploy application allowlisting to prevent execution of unauthorized scripts and applications

🔍 How to Verify

Check if Vulnerable:

Check MedDream version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\MedDream\PACS\Version

Check Version:

reg query "HKLM\SOFTWARE\MedDream\PACS" /v Version

Verify Fix Applied:

Verify registry permissions on configuration keys and confirm no unauthorized access is possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual registry access events to MedDream keys
  • Failed authentication attempts followed by registry queries
  • Process creation events for suspicious scripts accessing registry

Network Indicators:

  • Unusual outbound connections from MedDream servers
  • Traffic patterns indicating data exfiltration

SIEM Query:

EventID=4656 OR EventID=4663 AND ObjectName LIKE "%MedDream%" AND AccessMask IN (0x100, 0x200)

🔗 References

📤 Share & Export