CVE-2025-50594

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to reset any user account password in Danphe Health Hospital Management System EMR, enabling complete account takeover. It affects all organizations using the vulnerable version of this hospital management software. Attackers can gain unauthorized access to patient records, billing systems, and administrative functions.

💻 Affected Systems

Products:
  • Danphe Health Hospital Management System EMR
Versions: Version 3.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the SecuritySettingsController.cs file in the /Code/Websites/DanpheEMR/Controllers/Settings/ directory. All installations of version 3.2 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of hospital management system with unauthorized access to all patient medical records, financial data, and administrative controls, potentially leading to patient safety risks, data breaches, and system-wide disruption.

🟠

Likely Case

Account takeover leading to unauthorized access to sensitive patient health information (PHI), modification of medical records, and potential ransomware deployment on hospital systems.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and access controls prevent exploitation or detect unauthorized access attempts early.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The vulnerability is a Broken Object Level Authorization (BOLA) flaw where attackers can manipulate password reset requests. Exploitation requires some level of access but is technically simple once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact Danphe Health for patch information. 2. If patch is available, download from official vendor source. 3. Backup system and database. 4. Apply patch following vendor instructions. 5. Test functionality after patching.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to the Danphe EMR application to only trusted internal networks and implement strict firewall rules.

Enhanced Monitoring

all

Implement detailed logging and monitoring of password reset attempts and account modifications.

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with rules to detect and block suspicious password reset patterns
  • Enforce multi-factor authentication for all administrative and clinical user accounts

🔍 How to Verify

Check if Vulnerable:

Check the version in the application's admin panel or configuration files. If running version 3.2, the system is vulnerable.

Check Version:

Check application configuration files or admin dashboard for version information

Verify Fix Applied:

Test password reset functionality with proper authorization checks. Attempt to reset another user's password without proper permissions should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from single IP
  • Password reset requests for multiple different user accounts from same source
  • Unusual time or location for password reset activities

Network Indicators:

  • HTTP POST requests to /SecuritySettingsController endpoints with manipulated user IDs
  • Unusual traffic patterns to password reset functionality

SIEM Query:

source="danphe_logs" AND (event="password_reset" OR event="account_modify") AND user_id!=src_user

🔗 References

📤 Share & Export