CVE-2025-53912

MedDream · MedDream PACS Premium

A critical vulnerability has been identified in MedDream PACS Premium, a medical imaging and communication system.

Executive summary

A critical vulnerability has been identified in MedDream PACS Premium, a medical imaging and communication system. This flaw allows an unauthenticated remote attacker to read any file on the server, potentially exposing highly sensitive patient data and system configuration files. Due to the critical severity (CVSS 9.6) and the sensitive nature of the data handled by this software, immediate remediation is required to prevent a major data breach.

Vulnerability

The vulnerability is an arbitrary file read located in the encapsulatedDoc functionality of the application. An attacker can send a specially crafted HTTP request to this function, manipulating input parameters to specify a file path on the server's file system. Due to improper input validation, the application processes this path and returns the contents of the requested file, allowing the attacker to read sensitive data outside of the intended web directory, including configuration files, source code, or patient records stored on the system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. Successful exploitation could lead to a catastrophic data breach of Protected Health Information (PHI), resulting in severe consequences. The business risks include significant regulatory fines for non-compliance with standards like HIPAA, substantial reputational damage to the healthcare organization, and a loss of patient trust. Furthermore, exposure of system configuration files could facilitate further attacks against the organization's infrastructure.

Remediation

Immediate Action: Update MedDream PACS Premium to the latest version provided by the vendor immediately. After applying the patch, review server access logs for any signs of exploitation attempts that may have occurred prior to remediation.

Proactive Monitoring: Security teams should actively monitor web server logs for HTTP requests to the encapsulatedDoc endpoint that contain suspicious patterns, such as directory traversal sequences (../, ..\\) or absolute file paths. Monitor for unusual outbound network traffic from the PACS server, which could indicate data exfiltration.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block path traversal and other file inclusion attack patterns. Additionally, restrict network access to the MedDream application, allowing connections only from trusted internal IP addresses to limit the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity (CVSS 9.6) of this vulnerability and the high risk of sensitive data exposure, it is strongly recommended that organizations patch all affected MedDream PACS Premium systems with the utmost urgency. The potential for a breach involving protected patient health information makes this a top-priority issue. Although there is no evidence of active exploitation at this time, the simplicity of the attack vector means that an exploit could be developed and deployed rapidly. Organizations must act now to mitigate this critical risk.