CVE-2025-62575
Published: 02 December 2025
Description
NMIS/BioDose V22.02 and previous versions rely on a Microsoft SQL Server database. The SQL user account 'nmdbuser' and other created accounts by default have the sysadmin role. This can lead to remote code execution through the use of certain built-in…
more
stored procedures.
Mitigating Controls (NIST 800-53 r5)AI
Enforces least privilege by ensuring database accounts like 'nmdbuser' are not assigned excessive sysadmin roles, directly preventing remote code execution via built-in stored procedures.
Manages account provisioning, privilege assignment, and periodic reviews to avoid defaulting application SQL accounts to sysadmin roles that enable exploitation.
Establishes and enforces secure baseline configuration settings for databases, mitigating default sysadmin role assignments in NMIS/BioDose deployments.
Security SummaryAI
CVE-2025-62575 is a vulnerability in NMIS/BioDose versions V22.02 and earlier, which rely on a Microsoft SQL Server database. By default, the SQL user account 'nmdbuser' and other created accounts are assigned the sysadmin role, enabling remote code execution through certain built-in stored procedures. The issue stems from incorrect permission assignment (CWE-732) and carries a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).
An attacker requires low privileges, such as access to an affected SQL account, to exploit the vulnerability remotely over the network with low complexity and no user interaction. Exploitation allows high confidentiality and integrity impacts, with low availability disruption, culminating in remote code execution on the SQL Server.
Mitigation details are provided in the CISA ICS Medical Advisory ICSMA-25-336-01 at https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-336-01.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability grants sysadmin privileges to SQL accounts, enabling remote code execution via built-in stored procedures on Microsoft SQL Server, directly mapping to Exploitation of Remote Services.