CVE-2025-35033

4.1 MEDIUM

📋 TL;DR

Medical Informatics Engineering Enterprise Health has a CSV injection vulnerability that allows authenticated attackers to embed malicious macros in downloadable CSV files. This could lead to code execution when victims open these files in spreadsheet applications. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Medical Informatics Engineering Enterprise Health
Versions: All versions before 2025-03-14
Operating Systems: Any OS running Enterprise Health
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to generate/download CSV files from the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains remote code execution on victim's workstation when malicious CSV file is opened with macros enabled, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Targeted phishing campaign where authenticated attackers craft malicious CSV files that execute macros on victim workstations, compromising individual systems.

🟢

If Mitigated

Limited impact if macro execution is disabled in spreadsheet applications and users are trained not to enable macros from untrusted sources.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but CSV files could be downloaded from internet-facing portals.
🏢 Internal Only: MEDIUM - Authenticated internal users could exploit to target colleagues through shared CSV exports.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and social engineering to get victims to open CSV files with macros enabled. Exploit depends on victim's spreadsheet application configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions updated on or after 2025-03-14

Vendor Advisory: https://www.cve.org/CVERecord?id=CVE-2025-35033

Restart Required: No

Instructions:

1. Update Enterprise Health to version released on or after 2025-03-14. 2. Apply vendor-provided patches. 3. Verify CSV file generation no longer accepts macro injection.

🔧 Temporary Workarounds

Disable macro execution in spreadsheet applications

all

Configure Microsoft Excel and other spreadsheet software to disable macro execution by default or require explicit user approval.

Restrict CSV download permissions

all

Limit which authenticated users can generate and download CSV files from the system.

🧯 If You Can't Patch

  • Implement application allowlisting to prevent unauthorized macro execution
  • Train users to never enable macros in downloaded CSV files and to open them in text editors first

🔍 How to Verify

Check if Vulnerable:

Check Enterprise Health version date - if before 2025-03-14, system is vulnerable. Test CSV export functionality for macro injection.

Check Version:

Check system administration interface for version information or build date

Verify Fix Applied:

After patching, attempt to inject macros into CSV export fields and verify they are properly sanitized in output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV download patterns from single user accounts
  • Multiple CSV downloads in short timeframes

Network Indicators:

  • Large CSV file downloads followed by external connections from workstations

SIEM Query:

source="enterprise_health" AND (event="csv_download" OR event="file_export") | stats count by user, src_ip

🔗 References

📤 Share & Export