CVE-2025-61940
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-04
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nmis | biodose | * |
| nmis | nmis | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-603 | A client/server product performs authentication within client code but not in server code, allowing server-side authentication to be bypassed via a modified client that omits the authentication check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in NMIS/BioDose V22.02 and earlier versions arises because the software uses a common SQL Server user account for database access. Although the client application restricts user access via password authentication, the database connection itself always has access using this shared account. This means that users could potentially bypass client-side restrictions and access or manipulate data directly through the database connection. The latest version introduces an option to use Windows user authentication to restrict database access more securely.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to sensitive data stored in the database because the shared SQL Server account bypasses client-side authentication controls. An attacker or unauthorized user with access to the client application could exploit this to read, modify, or delete data, potentially causing data breaches, data integrity issues, and operational disruptions.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade to the latest version of NMIS/BioDose which introduces an option to use Windows user authentication with the database. This restricts the database connection and reduces the risk associated with the common SQL Server user account access.