CVE-2025-35030

Informatics · Informatics Multiple Products

A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in multiple Medical Informatics Engineering products.

Executive summary

A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in multiple Medical Informatics Engineering products. This flaw allows an unauthenticated attacker to trick an authenticated administrator into unknowingly executing malicious commands, potentially leading to unauthorized system changes, data modification, or a compromise of sensitive patient health information.

Vulnerability

The vulnerability is a Cross-Site Request Forgery (CSRF) flaw within the Enterprise Health application. An attacker can exploit this by crafting a malicious URL or web page and enticing a logged-in administrative user to click on it. When the victim visits the malicious link, their browser automatically sends a forged request to the vulnerable application, which the application processes as a legitimate action from the administrator, as it lacks proper anti-CSRF token validation. This could allow the attacker to perform any action the administrator is authorized to do, such as creating new users, modifying system settings, or altering sensitive medical records.

Business impact

This is a high-severity vulnerability with a CVSS score of 8.1. Successful exploitation could have a severe impact on the organization, particularly given the context of a medical informatics system. An attacker could compromise the confidentiality, integrity, and availability of Protected Health Information (PHI). Specific risks include unauthorized modification of patient data, creation of rogue administrative accounts for persistent access, and disruption of critical healthcare services. Such an incident could lead to significant regulatory fines (e.g., HIPAA violations), reputational damage, and a loss of patient trust.

Remediation

Immediate Action:

  • Immediately apply the security updates provided by the vendor across all affected systems.
  • Prioritize patching for internet-facing systems and those that house critical data.
  • Review application and access logs for any unusual or unauthorized administrative actions that may indicate prior exploitation.

Proactive Monitoring:

  • Monitor application logs for unexpected administrative activities, such as user creation or permission changes, especially if they correlate with users reporting suspicious emails or links.
  • Analyze web server and network logs for requests to administrative endpoints that have an unusual or missing "Referer" header, which can be an indicator of a CSRF attempt.
  • Implement alerts for multiple failed login attempts followed by a successful one, which could precede an attempt to leverage an authenticated session.

Compensating Controls:

  • If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block CSRF attack patterns.
  • Enforce strict SameSite cookie policies to prevent browsers from sending session cookies with cross-site requests.
  • Educate administrative users on the risks of clicking unsolicited links and advise them to log out of their administrative sessions when not in use.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.1 and the critical nature of the affected medical systems, this vulnerability poses a significant risk. We strongly recommend that organizations prioritize the immediate application of vendor-supplied patches to all affected products. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants urgent attention. For any systems where patching is delayed, the compensating controls outlined above should be implemented without delay to reduce the attack surface.