CVE-2025-64778

7.3 HIGH

📋 TL;DR

NMIS/BioDose software versions V22.02 and earlier contain hard-coded plain text passwords in executable binaries, allowing attackers to bypass authentication and gain unauthorized access to both the application and database. This affects all organizations using these vulnerable versions of the medical/ICS software.

💻 Affected Systems

Products:
  • NMIS/BioDose
Versions: V22.02 and all previous versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions contain the hard-coded passwords in binaries.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of medical/ICS systems, unauthorized access to sensitive patient/medical data, potential manipulation of medical device operations or dosimetry calculations.

🟠

Likely Case

Unauthorized access to application interfaces and databases, data exfiltration of medical/industrial control system information, potential lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires extracting hard-coded passwords from binaries through reverse engineering or memory analysis, then using them for authentication bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V22.03 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-336-01

Restart Required: Yes

Instructions:

1. Download and install NMIS/BioDose V22.03 or later from official vendor sources. 2. Stop all NMIS/BioDose services. 3. Install the update following vendor documentation. 4. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Segmentation and Access Controls

all

Restrict network access to NMIS/BioDose systems to only authorized users and systems using firewalls and network segmentation.

Credential Rotation

all

Change all database and application passwords that may have been exposed through hard-coded credentials.

🧯 If You Can't Patch

  • Isolate NMIS/BioDose systems from internet and untrusted networks using network segmentation and firewall rules.
  • Implement strict access controls and monitoring for all connections to NMIS/BioDose systems, alerting on any unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check NMIS/BioDose version in application interface or installation directory. Versions V22.02 or earlier are vulnerable.

Check Version:

Check application interface or installation documentation for version information.

Verify Fix Applied:

Verify installation of V22.03 or later by checking version in application interface and confirming hard-coded passwords are no longer present in binaries through file analysis.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful logins using unexpected credentials
  • Database access from unauthorized user accounts
  • Unusual application access patterns or times

Network Indicators:

  • Network connections to NMIS/BioDose systems from unauthorized IP addresses
  • Database queries from unexpected sources

SIEM Query:

source="nms_logs" OR source="biodose_logs" AND (event_type="authentication" AND result="success" AND user NOT IN [authorized_users])

🔗 References

📤 Share & Export