cve-2025-1001
Vulnerability from cvelistv5
Published
2025-02-21 00:48
Modified
2025-02-21 21:28
Severity ?
5.7 (Medium) - CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
5.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
5.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
EPSS score ?
Summary
Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Medixant | RadiAnt DICOM Viewer |
Version: 2024.02 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1001", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-21T15:44:30.371666Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-21T21:28:49.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RadiAnt DICOM Viewer", "vendor": "Medixant", "versions": [ { "status": "affected", "version": "2024.02" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Sharon Brizinov of Claroty Team82 reported this vulnerability to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMedixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server\u0027s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server\u0027s response and deliver a malicious update to the user.\u003c/span\u003e" } ], "value": "Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server\u0027s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server\u0027s response and deliver a malicious update to the user." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "ADJACENT", "baseScore": 5.7, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-21T00:48:52.489Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-051-01" }, { "url": "https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMedixant recommends users download the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe\"\u003ev2025.1 or later version\u003c/a\u003e\u0026nbsp;of their software.\u003c/p\u003e\u003cbr\u003e" } ], "value": "Medixant recommends users download the v2025.1 or later version https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe \u00a0of their software." } ], "source": { "advisory": "ICSMA-25-051-01", "discovery": "EXTERNAL" }, "title": "Medixant RadiAnt DICOM Viewer Improper Certificate Validation", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIf users are unable to update to the new version, Medixant recommends the following:\u003c/p\u003e\u003cul\u003e\u003cli\u003eDisable\n the display of available updates via this command reg add \n\"HKCU\\Software\\RadiAnt Viewer\" /t REG_DWORD /v CheckUpdate /d 0 /f.\u003c/li\u003e\u003cli\u003eDo not check manually for updates (\"Check for updates now\" from the toolbar menu).\u003c/li\u003e\u003cli\u003eIgnore any update notifications coming from RadiAnt DICOM Viewer, download the latest version directly in the web browser from \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.radiantviewer.com/\"\u003ehttps://www.radiantviewer.com\u003c/a\u003e.\u003c/li\u003e\u003cli\u003eCheck the downloaded RadiAnt DICOM Viewer installation package with antivirus software before running it.\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "If users are unable to update to the new version, Medixant recommends the following:\n\n * Disable\n the display of available updates via this command reg add \n\"HKCU\\Software\\RadiAnt Viewer\" /t REG_DWORD /v CheckUpdate /d 0 /f.\n * Do not check manually for updates (\"Check for updates now\" from the toolbar menu).\n * Ignore any update notifications coming from RadiAnt DICOM Viewer, download the latest version directly in the web browser from https://www.radiantviewer.com https://www.radiantviewer.com/ .\n * Check the downloaded RadiAnt DICOM Viewer installation package with antivirus software before running it." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2025-1001", "datePublished": "2025-02-21T00:48:52.489Z", "dateReserved": "2025-02-03T18:33:02.870Z", "dateUpdated": "2025-02-21T21:28:49.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-1001\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2025-02-21T01:15:09.533\",\"lastModified\":\"2025-02-21T01:15:09.533\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server\u0027s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server\u0027s response and deliver a malicious update to the user.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"ACTIVE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"NONE\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-051-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-1001\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-21T15:44:30.371666Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-21T15:44:31.786Z\"}}], \"cna\": {\"title\": \"Medixant RadiAnt DICOM Viewer Improper Certificate Validation\", \"source\": {\"advisory\": \"ICSMA-25-051-01\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Sharon Brizinov of Claroty Team82 reported this vulnerability to CISA.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"ACTIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.7, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Medixant\", \"product\": \"RadiAnt DICOM Viewer\", \"versions\": [{\"status\": \"affected\", \"version\": \"2024.02\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Medixant recommends users download the v2025.1 or later version https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe \\u00a0of their software.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eMedixant recommends users download the \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe\\\"\u003ev2025.1 or later version\u003c/a\u003e\u0026nbsp;of their software.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-051-01\"}, {\"url\": \"https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"If users are unable to update to the new version, Medixant recommends the following:\\n\\n * Disable\\n the display of available updates via this command reg add \\n\\\"HKCU\\\\Software\\\\RadiAnt Viewer\\\" /t REG_DWORD /v CheckUpdate /d 0 /f.\\n * Do not check manually for updates (\\\"Check for updates now\\\" from the toolbar menu).\\n * Ignore any update notifications coming from RadiAnt DICOM Viewer, download the latest version directly in the web browser from https://www.radiantviewer.com https://www.radiantviewer.com/ .\\n * Check the downloaded RadiAnt DICOM Viewer installation package with antivirus software before running it.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIf users are unable to update to the new version, Medixant recommends the following:\u003c/p\u003e\u003cul\u003e\u003cli\u003eDisable\\n the display of available updates via this command reg add \\n\\\"HKCU\\\\Software\\\\RadiAnt Viewer\\\" /t REG_DWORD /v CheckUpdate /d 0 /f.\u003c/li\u003e\u003cli\u003eDo not check manually for updates (\\\"Check for updates now\\\" from the toolbar menu).\u003c/li\u003e\u003cli\u003eIgnore any update notifications coming from RadiAnt DICOM Viewer, download the latest version directly in the web browser from \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.radiantviewer.com/\\\"\u003ehttps://www.radiantviewer.com\u003c/a\u003e.\u003c/li\u003e\u003cli\u003eCheck the downloaded RadiAnt DICOM Viewer installation package with antivirus software before running it.\u003c/li\u003e\u003c/ul\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server\u0027s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server\u0027s response and deliver a malicious update to the user.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eMedixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server\u0027s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server\u0027s response and deliver a malicious update to the user.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2025-02-21T00:48:52.489Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-1001\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-21T21:28:49.043Z\", \"dateReserved\": \"2025-02-03T18:33:02.870Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2025-02-21T00:48:52.489Z\", \"assignerShortName\": \"icscert\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.