Cyber Posture

CVE-2025-0896

Critical

Published: 13 February 2025

Published
13 February 2025
Modified
30 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0030 52.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker.

Security Summary

CVE-2025-0896 is a critical authentication vulnerability in Orthanc server versions prior to 1.5.8. The issue arises because the server does not enable basic authentication by default when remote access is configured, potentially exposing the service to unauthorized access by attackers. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-306 (Missing Authentication for Critical Function). Published on 2025-02-13, this flaw affects Orthanc, an open-source DICOM server commonly used in medical imaging environments.

Any unauthenticated attacker with network access to the Orthanc server can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation enables unauthorized access to the server, resulting in high-impact consequences across confidentiality, integrity, and availability, such as viewing sensitive patient data, altering DICOM resources, or denying service.

The CISA ICS medical advisory ICSMA-25-037-02 provides additional details on this vulnerability: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-02. Mitigation requires upgrading to Orthanc server version 1.5.8 or later, along with ensuring proper authentication configuration for remote access.

Details

CWE(s)
CWE-306

Affected Products

orthanc-server
orthanc
≤ 1.5.8

References