CVE-2025-61940
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2025-12-04

Assigner: ICS-CERT

Description
NMIS/BioDose V22.02 and previous versions rely on a common SQL Server user account to access data in the database. User access in the client application is restricted by a password authentication check in the client software but the underlying database connection always has access. The latest version of NMIS/BioDose introduces an option to use Windows user authentication with the database, which would restrict this database connection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2025-12-04
Generated
2026-05-07
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nmis biodose *
nmis nmis *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-603 A client/server product performs authentication within client code but not in server code, allowing server-side authentication to be bypassed via a modified client that omits the authentication check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in NMIS/BioDose V22.02 and earlier versions arises because the software uses a common SQL Server user account for database access. Although the client application restricts user access via password authentication, the database connection itself always has access using this shared account. This means that users could potentially bypass client-side restrictions and access or manipulate data directly through the database connection. The latest version introduces an option to use Windows user authentication to restrict database access more securely.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive data stored in the database because the shared SQL Server account bypasses client-side authentication controls. An attacker or unauthorized user with access to the client application could exploit this to read, modify, or delete data, potentially causing data breaches, data integrity issues, and operational disruptions.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade to the latest version of NMIS/BioDose which introduces an option to use Windows user authentication with the database. This restricts the database connection and reduces the risk associated with the common SQL Server user account access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart