CVE-2025-2263
Published: 13 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-2263 is a stack-based buffer overflow vulnerability affecting the web server login functionality in Sante PACS Server.exe. The issue occurs when the OpenSSL function EVP_DecryptUpdate is invoked to decrypt the supplied username and password, passing a fixed 0x80-byte stack-based buffer as the output parameter. Supplying a long encrypted username or password exceeds this buffer size, triggering the overflow.
An unauthenticated remote attacker can exploit this vulnerability over the network by submitting a login request with an excessively long encrypted credential. The CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects its critical severity, enabling potential arbitrary code execution with high impacts on confidentiality, integrity, and availability. It maps to CWE-121 (Stack-based Buffer Overflow) and CWE-787 (Out-of-bounds Write).
Mitigation details are available in the Tenable research advisory at https://www.tenable.com/security/research/tra-2025-08, published on 2025-03-13.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unauthenticated remote stack-based buffer overflow in web server login via crafted encrypted credentials enables exploitation of a public-facing application for potential RCE.