CVE-2025-63958
MILLENSYS · MILLENSYS Vision Tools Workspace Multiple Products
A critical vulnerability has been discovered in MILLENSYS Vision Tools Workspace that allows an unauthenticated attacker to access a sensitive configuration page.
Executive summary
A critical vulnerability has been discovered in MILLENSYS Vision Tools Workspace that allows an unauthenticated attacker to access a sensitive configuration page. This exposure leaks critical information, including plaintext database credentials, which could be used to compromise the entire system, leading to a significant data breach and operational disruption.
Vulnerability
The vulnerability is an Improper Access Control flaw. The application's configuration endpoint, located at /MILLENSYS/settings, does not enforce any authentication or authorization checks. An unauthenticated attacker can exploit this by sending a direct HTTP GET request to this URL. The server will respond with the configuration page, which contains highly sensitive information in plaintext, including database connection strings (username and password), internal network file share paths, license server details, and software update parameters. This information provides an attacker with the necessary credentials and system knowledge to access backend databases, file systems, and other critical infrastructure components.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a catastrophic business impact, including a complete compromise of the application's database, leading to the theft, modification, or destruction of sensitive data, such as patient records or proprietary company information. The leaked credentials for file shares could expose the organization to a ransomware attack or further lateral movement across the network. The overall risk includes major data breaches, regulatory fines (e.g., HIPAA), reputational damage, and extended system downtime.
Remediation
Immediate Action:
- Immediately apply the vendor-supplied patch to update all instances of MILLENSYS Vision Tools Workspace to the latest version.
- Review web server access logs for any historical requests to the
/MILLENSYS/settingsendpoint to identify potential compromise. - Assume the leaked credentials have been compromised and initiate a password rotation for the database and any other affected services.
Proactive Monitoring:
- Implement continuous monitoring of web server logs, specifically looking for any access attempts to the
/MILLENSYS/settingsURL. Alert on any successful (HTTP 200) responses from untrusted sources. - Monitor database and file share logs for unusual access patterns, especially logins from unexpected IP addresses or at unusual times, that may indicate the use of compromised credentials.
Compensating Controls:
- If immediate patching is not feasible, implement a rule on a Web Application Firewall (WAF) or reverse proxy to explicitly block all external access to the
/MILLENSYS/settingsendpoint. - Restrict network access to the database and file servers, ensuring they can only be reached from the application server and not from other parts of the network, limiting the utility of the stolen credentials.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.8 and the direct exposure of plaintext credentials, this vulnerability presents a severe and immediate risk to the organization. Although this CVE is not currently listed on the CISA KEV list, its impact warrants an emergency response. We strongly recommend that organizations prioritize the immediate deployment of the vendor patch across all affected systems. Until patching is complete, the compensating controls listed above should be implemented without delay to reduce the attack surface.